nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An HMM and structural entropy based detector for Android malware: An empirical study
|
Canfora, Gerardo |
|
2016 |
61 |
C |
p. 1-18 18 p. |
artikel |
2 |
A survey of security solutions for distributed publish/subscribe systems
|
Uzunov, Anton V. |
|
2016 |
61 |
C |
p. 94-129 36 p. |
artikel |
3 |
Can perceptual differences account for enigmatic information security behaviour in an organisation?
|
Kearney, W.D. |
|
2016 |
61 |
C |
p. 46-58 13 p. |
artikel |
4 |
Contents
|
|
|
2016 |
61 |
C |
p. iii- 1 p. |
artikel |
5 |
Control flow obfuscation for Android applications
|
Balachandran, Vivek |
|
2016 |
61 |
C |
p. 72-93 22 p. |
artikel |
6 |
Cyber resilience recovery model to combat zero-day malware attacks
|
Tran, Hiep |
|
2016 |
61 |
C |
p. 19-31 13 p. |
artikel |
7 |
IFC - Editorial Board
|
|
|
2016 |
61 |
C |
p. CO2- 1 p. |
artikel |
8 |
Information security policy development and implementation: The what, how and who
|
Flowerday, Stephen V. |
|
2016 |
61 |
C |
p. 169-183 15 p. |
artikel |
9 |
NIC displays to thwart malware attacks mounted from within the OS
|
Rrushi, Julian L. |
|
2016 |
61 |
C |
p. 59-71 13 p. |
artikel |
10 |
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs
|
Boshmaf, Yazan |
|
2016 |
61 |
C |
p. 142-168 27 p. |
artikel |
11 |
The future of information security incident management training: A case study of electrical power companies
|
Bartnes, Maria |
|
2016 |
61 |
C |
p. 32-45 14 p. |
artikel |
12 |
User practice in password security: An empirical study of real-life passwords in the wild
|
Shen, Chao |
|
2016 |
61 |
C |
p. 130-141 12 p. |
artikel |