Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS Wagner, Markus
2017
67 C p. 1-15
15 p.
article
2 Analyzing research trends in personal information privacy using topic modeling Choi, Hyo Shin
2017
67 C p. 244-253
10 p.
article
3 A novel access control protocol using proxy signatures for cloud-based health information exchange Chandrasekhar, Santosh
2017
67 C p. 73-88
16 p.
article
4 A novel kill-chain framework for remote security log analysis with SIEM software Bryant, Blake D.
2017
67 C p. 198-210
13 p.
article
5 Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets Skračić, Kristian
2017
67 C p. 107-121
15 p.
article
6 Automatic detection and demonstrator generation for information flow leaks in object-oriented programs Do, Quoc Huy
2017
67 C p. 335-349
15 p.
article
7 Challenges in IT security preparedness exercises: A case study Bartnes, Maria
2017
67 C p. 280-290
11 p.
article
8 Contents 2017
67 C p. iii-iv
nvt p.
article
9 Data-driven analytics for cyber-threat intelligence and information sharing Qamar, Sara
2017
67 C p. 35-58
24 p.
article
10 Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015) Herrmann, Dominik
2017
67 C p. 266-
1 p.
article
11 Enhanced PKI authentication with trusted product at claimant Yamada, Asahiko
2017
67 C p. 324-334
11 p.
article
12 Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology Mohammed, Zareef A.
2017
67 C p. 254-265
12 p.
article
13 Exploring the protection of private browsing in desktop browsers Tsalis, Nikolaos
2017
67 C p. 181-197
17 p.
article
14 Fast revocation of attribute-based credentials for both users and verifiers Lueks, Wouter
2017
67 C p. 308-323
16 p.
article
15 IFC - Editorial Board 2017
67 C p. CO2-
1 p.
article
16 Invi-server: Reducing the attack surfaces by making protected server invisible on networks Park, Jaehyun
2017
67 C p. 89-106
18 p.
article
17 Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet Chen, Yizheng
2017
67 C p. 164-180
17 p.
article
18 Practice-based discourse analysis of information security policies Karlsson, Fredrik
2017
67 C p. 267-279
13 p.
article
19 Privacy policies verification in composite services using OWL Khurat, Assadarat
2017
67 C p. 122-141
20 p.
article
20 Protecting personal trajectories of social media users through differential privacy Wang, Shuo
2017
67 C p. 142-163
22 p.
article
21 Providing robust security measures to Bloom filter based biometric template protection schemes Sadhya, Debanjan
2017
67 C p. 59-72
14 p.
article
22 Socialized policy administration Guo, Zeqing
2017
67 C p. 232-243
12 p.
article
23 Towards a causality based analysis of anonymity protection in indeterministic mix systems Pham, Dang Vinh
2017
67 C p. 350-368
19 p.
article
24 Towards a system for complex analysis of security events in large-scale networks Sapegin, Andrey
2017
67 C p. 16-34
19 p.
article
25 Trustworthy exams without trusted parties Bella, Giampaolo
2017
67 C p. 291-307
17 p.
article
26 Unified authentication factors and fuzzy service access using interaction provenance Hasan, Ragib
2017
67 C p. 211-231
21 p.
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands