nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An adaptive framework for the detection of novel botnets
|
Álvarez Cid-Fuentes, Javier |
|
|
79 |
C |
p. 148-161 |
artikel |
2 |
Announcement
|
|
|
|
79 |
C |
p. iv |
artikel |
3 |
Computers & Security Editorial Board
|
|
|
|
79 |
C |
p. ii-iii |
artikel |
4 |
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection
|
Landauer, Max |
|
|
79 |
C |
p. 94-116 |
artikel |
5 |
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
|
Hong, Jin B. |
|
|
79 |
C |
p. 33-52 |
artikel |
6 |
Evaluating practitioner cyber-security attack graph configuration preferences
|
Lallie, Harjinder Singh |
|
|
79 |
C |
p. 117-131 |
artikel |
7 |
Exploiting IP telephony with silence suppression for hidden data transfers
|
Schmidt, Sabine |
|
|
79 |
C |
p. 17-32 |
artikel |
8 |
M2M-REP: Reputation system for machines in the internet of things
|
Azad, Muhammad Ajmal |
|
|
79 |
C |
p. 1-16 |
artikel |
9 |
Modelling the malware propagation in mobile computer devices
|
Signes-Pont, María Teresa |
|
|
79 |
C |
p. 80-93 |
artikel |
10 |
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
|
Conti, Mauro |
|
|
79 |
C |
p. 162-189 |
artikel |
11 |
Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection
|
Hong, Sanghyun |
|
|
79 |
C |
p. 190-207 |
artikel |
12 |
Privacy-oriented dependency via deniable SIGMA protocol
|
Krzywiecki, Łukasz |
|
|
79 |
C |
p. 53-67 |
artikel |
13 |
The impact of security Awareness on information technology professionals’ behavior
|
Torten, Ron |
|
|
79 |
C |
p. 68-79 |
artikel |
14 |
Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks
|
Serrano Mamolar, Ana |
|
|
79 |
C |
p. 132-147 |
artikel |