nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control lists in password capability environments
|
Lopriore, Lanfranco |
|
2016 |
62 |
C |
p. 317-327 11 p. |
artikel |
2 |
A foresight model for intrusion response management
|
GhasemiGol, Mohammad |
|
2016 |
62 |
C |
p. 73-94 22 p. |
artikel |
3 |
A phish detector using lightweight search features
|
Varshney, Gaurav |
|
2016 |
62 |
C |
p. 213-228 16 p. |
artikel |
4 |
A privacy enforcing framework for Android applications
|
Neisse, Ricardo |
|
2016 |
62 |
C |
p. 257-277 21 p. |
artikel |
5 |
Automated border control e-gates and facial recognition systems
|
Sanchez del Rio, Jose |
|
2016 |
62 |
C |
p. 49-72 24 p. |
artikel |
6 |
Contents
|
|
|
2016 |
62 |
C |
p. iii- 1 p. |
artikel |
7 |
Eliciting metrics for accountability of cloud systems
|
Nuñez, David |
|
2016 |
62 |
C |
p. 149-164 16 p. |
artikel |
8 |
Exploring infrastructure support for app-based services on cloud platforms
|
Nguyen, Hai |
|
2016 |
62 |
C |
p. 177-192 16 p. |
artikel |
9 |
From old to new: Assessing cybersecurity risks for an evolving smart grid
|
Langer, Lucie |
|
2016 |
62 |
C |
p. 165-176 12 p. |
artikel |
10 |
IFC - Editorial Board
|
|
|
2016 |
62 |
C |
p. CO2- 1 p. |
artikel |
11 |
Minimal contrast frequent pattern mining for malware detection
|
Hellal, Aya |
|
2016 |
62 |
C |
p. 19-32 14 p. |
artikel |
12 |
Modelling cyber-security experts' decision making processes using aggregation operators
|
Miller, Simon |
|
2016 |
62 |
C |
p. 229-245 17 p. |
artikel |
13 |
Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms
|
Bajwa, Garima |
|
2016 |
62 |
C |
p. 95-113 19 p. |
artikel |
14 |
Novel efficient techniques for real-time cloud security assessment
|
Modic, Jolanda |
|
2016 |
62 |
C |
p. 1-18 18 p. |
artikel |
15 |
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators
|
Kim, Yonggon |
|
2016 |
62 |
C |
p. 33-48 16 p. |
artikel |
16 |
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid
|
Wan, Zhiguo |
|
2016 |
62 |
C |
p. 246-256 11 p. |
artikel |
17 |
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks
|
Hassanzadeh, Amin |
|
2016 |
62 |
C |
p. 114-132 19 p. |
artikel |
18 |
Robust image hashing via DCT and LLE
|
Tang, Zhenjun |
|
2016 |
62 |
C |
p. 133-148 16 p. |
artikel |
19 |
SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems
|
Jiang, Rui |
|
2016 |
62 |
C |
p. 193-212 20 p. |
artikel |
20 |
The simulated security assessment ecosystem: Does penetration testing need standardisation?
|
Knowles, William |
|
2016 |
62 |
C |
p. 296-316 21 p. |
artikel |
21 |
Time between vulnerability disclosures: A measure of software product vulnerability
|
Johnson, Pontus |
|
2016 |
62 |
C |
p. 278-295 18 p. |
artikel |
22 |
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment
|
Razaque, Abdul |
|
2016 |
62 |
C |
p. 328-347 20 p. |
artikel |