nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive evidence collection in the cloud using attack scenarios
|
Pasquale, Liliana |
|
2016 |
59 |
C |
p. 236-254 19 p. |
artikel |
2 |
A network based document management model to prevent data extrusion
|
Morovati, Kamran |
|
2016 |
59 |
C |
p. 71-91 21 p. |
artikel |
3 |
A survey on touch dynamics authentication in mobile devices
|
Teh, Pin Shen |
|
2016 |
59 |
C |
p. 210-235 26 p. |
artikel |
4 |
Automated feature engineering for HTTP tunnel detection
|
Davis, Jonathan J. |
|
2016 |
59 |
C |
p. 166-185 20 p. |
artikel |
5 |
Automated key exchange protocol evaluation in delay tolerant networks
|
Menesidou, Sofia Anna |
|
2016 |
59 |
C |
p. 1-8 8 p. |
artikel |
6 |
Contents
|
|
|
2016 |
59 |
C |
p. iii- 1 p. |
artikel |
7 |
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models
|
Junaid, Mohsin |
|
2016 |
59 |
C |
p. 92-117 26 p. |
artikel |
8 |
IFC - Editorial Board
|
|
|
2016 |
59 |
C |
p. CO2- 1 p. |
artikel |
9 |
Information system security commitment: A study of external influences on senior management
|
Barton, Kevin A. |
|
2016 |
59 |
C |
p. 9-25 17 p. |
artikel |
10 |
PCA-based multivariate statistical network monitoring for anomaly detection
|
Camacho, José |
|
2016 |
59 |
C |
p. 118-137 20 p. |
artikel |
11 |
Secure, efficient and revocable multi-authority access control system in cloud storage
|
Li, Qi |
|
2016 |
59 |
C |
p. 45-59 15 p. |
artikel |
12 |
Security-by-construction in web applications development via database annotations
|
El-Hajj, Wassim |
|
2016 |
59 |
C |
p. 151-165 15 p. |
artikel |
13 |
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness
|
Rocha Flores, Waldo |
|
2016 |
59 |
C |
p. 26-44 19 p. |
artikel |
14 |
Social engineering attack examples, templates and scenarios
|
Mouton, Francois |
|
2016 |
59 |
C |
p. 186-209 24 p. |
artikel |
15 |
Understanding information security stress: Focusing on the type of information security compliance activity
|
Lee, Chunghun |
|
2016 |
59 |
C |
p. 60-70 11 p. |
artikel |
16 |
Understanding online safety behaviors: A protection motivation theory perspective
|
Tsai, Hsin-yi Sandy |
|
2016 |
59 |
C |
p. 138-150 13 p. |
artikel |