Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             22 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access control lists in password capability environments Lopriore, Lanfranco
2016
62 C p. 317-327
11 p.
artikel
2 A foresight model for intrusion response management GhasemiGol, Mohammad
2016
62 C p. 73-94
22 p.
artikel
3 A phish detector using lightweight search features Varshney, Gaurav
2016
62 C p. 213-228
16 p.
artikel
4 A privacy enforcing framework for Android applications Neisse, Ricardo
2016
62 C p. 257-277
21 p.
artikel
5 Automated border control e-gates and facial recognition systems Sanchez del Rio, Jose
2016
62 C p. 49-72
24 p.
artikel
6 Contents 2016
62 C p. iii-
1 p.
artikel
7 Eliciting metrics for accountability of cloud systems Nuñez, David
2016
62 C p. 149-164
16 p.
artikel
8 Exploring infrastructure support for app-based services on cloud platforms Nguyen, Hai
2016
62 C p. 177-192
16 p.
artikel
9 From old to new: Assessing cybersecurity risks for an evolving smart grid Langer, Lucie
2016
62 C p. 165-176
12 p.
artikel
10 IFC - Editorial Board 2016
62 C p. CO2-
1 p.
artikel
11 Minimal contrast frequent pattern mining for malware detection Hellal, Aya
2016
62 C p. 19-32
14 p.
artikel
12 Modelling cyber-security experts' decision making processes using aggregation operators Miller, Simon
2016
62 C p. 229-245
17 p.
artikel
13 Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms Bajwa, Garima
2016
62 C p. 95-113
19 p.
artikel
14 Novel efficient techniques for real-time cloud security assessment Modic, Jolanda
2016
62 C p. 1-18
18 p.
artikel
15 On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators Kim, Yonggon
2016
62 C p. 33-48
16 p.
artikel
16 PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid Wan, Zhiguo
2016
62 C p. 246-256
11 p.
artikel
17 PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks Hassanzadeh, Amin
2016
62 C p. 114-132
19 p.
artikel
18 Robust image hashing via DCT and LLE Tang, Zhenjun
2016
62 C p. 133-148
16 p.
artikel
19 SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems Jiang, Rui
2016
62 C p. 193-212
20 p.
artikel
20 The simulated security assessment ecosystem: Does penetration testing need standardisation? Knowles, William
2016
62 C p. 296-316
21 p.
artikel
21 Time between vulnerability disclosures: A measure of software product vulnerability Johnson, Pontus
2016
62 C p. 278-295
18 p.
artikel
22 Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment Razaque, Abdul
2016
62 C p. 328-347
20 p.
artikel
                             22 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland