nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive approach for network attack forecasting
|
GhasemiGol, Mohammad |
|
2016 |
58 |
C |
p. 83-105 23 p. |
artikel |
2 |
A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms
|
Asghar, Hira |
|
2016 |
58 |
C |
p. 63-82 20 p. |
artikel |
3 |
A formal model and risk assessment method for security-critical real-time embedded systems
|
Ni, Siru |
|
2016 |
58 |
C |
p. 199-215 17 p. |
artikel |
4 |
Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines
|
Ulaş, Cihan |
|
2016 |
58 |
C |
p. 250-267 18 p. |
artikel |
5 |
An approach for deploying and monitoring dynamic security policies
|
Horcas, Jose-Miguel |
|
2016 |
58 |
C |
p. 20-38 19 p. |
artikel |
6 |
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
|
Jang, Jae-wook |
|
2016 |
58 |
C |
p. 125-138 14 p. |
artikel |
7 |
Are mobile botnets a possible threat? The case of SlowBot Net
|
Farina, Paolo |
|
2016 |
58 |
C |
p. 268-283 16 p. |
artikel |
8 |
A study on Web security incidents in China by analyzing vulnerability disclosure platforms
|
Huang, Cheng |
|
2016 |
58 |
C |
p. 47-62 16 p. |
artikel |
9 |
Causality reasoning about network events for detecting stealthy malware activities
|
Zhang, Hao |
|
2016 |
58 |
C |
p. 180-198 19 p. |
artikel |
10 |
CIPA: A collaborative intrusion prevention architecture for programmable network and SDN
|
Chen, Xiao-Fan |
|
2016 |
58 |
C |
p. 1-19 19 p. |
artikel |
11 |
Combating the evasion mechanisms of social bots
|
Ji, Yuede |
|
2016 |
58 |
C |
p. 230-249 20 p. |
artikel |
12 |
Contents
|
|
|
2016 |
58 |
C |
p. iii-iv nvt p. |
artikel |
13 |
Effect of anti-malware software on infectious nodes in cloud environment
|
Abazari, Farzaneh |
|
2016 |
58 |
C |
p. 139-148 10 p. |
artikel |
14 |
False sequential logic attack on SCADA system and its physical impact analysis
|
Li, Weize |
|
2016 |
58 |
C |
p. 149-159 11 p. |
artikel |
15 |
IFC - Editorial Board
|
|
|
2016 |
58 |
C |
p. CO2- 1 p. |
artikel |
16 |
Phishing: An economic analysis of cybercrime perpetrators
|
Konradt, Christian |
|
2016 |
58 |
C |
p. 39-46 8 p. |
artikel |
17 |
Privacy preservation for soft biometrics based multimodal recognition system
|
Sadhya, Debanjan |
|
2016 |
58 |
C |
p. 160-179 20 p. |
artikel |
18 |
Proactively applied encryption in multipath networks
|
Obert, James |
|
2016 |
58 |
C |
p. 106-124 19 p. |
artikel |
19 |
The impact of information security events to the stock market: A systematic literature review
|
Spanos, Georgios |
|
2016 |
58 |
C |
p. 216-229 14 p. |
artikel |