nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A spatial stochastic model for worm propagation: scale effects
|
Avlonitis, Markos |
|
|
3 |
2 |
p. 87-92 |
artikel |
2 |
A spatial stochastic model for worm propagation: scale effects
|
Avlonitis, Markos |
|
2007 |
3 |
2 |
p. 87-92 |
artikel |
3 |
A statistical model for undecidable viral detection
|
Filiol, Eric |
|
|
3 |
2 |
p. 65-74 |
artikel |
4 |
A statistical model for undecidable viral detection
|
Filiol, Eric |
|
2007 |
3 |
2 |
p. 65-74 |
artikel |
5 |
Bologna process revisited: educating information security and malware experts
|
Gattiker, Urs E. |
|
|
3 |
2 |
p. 149-161 |
artikel |
6 |
Bologna process revisited: educating information security and malware experts
|
Gattiker, Urs E. |
|
2007 |
3 |
2 |
p. 149-161 |
artikel |
7 |
Bot countermeasures
|
Thomas, Vinoo |
|
|
3 |
2 |
p. 103-111 |
artikel |
8 |
Bot countermeasures
|
Thomas, Vinoo |
|
2007 |
3 |
2 |
p. 103-111 |
artikel |
9 |
Considering the potential of criminal profiling to combat hacking
|
Preuß, Jörg |
|
|
3 |
2 |
p. 135-141 |
artikel |
10 |
Considering the potential of criminal profiling to combat hacking
|
Preuß, Jörg |
|
2007 |
3 |
2 |
p. 135-141 |
artikel |
11 |
Foreword
|
Broucek, Vlasti |
|
|
3 |
2 |
p. 63-64 |
artikel |
12 |
Foreword
|
Broucek, Vlasti |
|
2007 |
3 |
2 |
p. 63-64 |
artikel |
13 |
Formalisation and implementation aspects of K-ary (malicious) codes
|
Filiol, Eric |
|
|
3 |
2 |
p. 75-86 |
artikel |
14 |
Formalisation and implementation aspects of K-ary (malicious) codes
|
Filiol, Eric |
|
2007 |
3 |
2 |
p. 75-86 |
artikel |
15 |
How good is good enough? Metrics for worm/anti-worm evaluation
|
Ondi, Attila |
|
|
3 |
2 |
p. 93-101 |
artikel |
16 |
How good is good enough? Metrics for worm/anti-worm evaluation
|
Ondi, Attila |
|
2007 |
3 |
2 |
p. 93-101 |
artikel |
17 |
Letter from the EICAR Chairman
|
Fahs, Rainer |
|
|
3 |
2 |
p. 61 |
artikel |
18 |
Letter from the EICAR Chairman
|
Fahs, Rainer |
|
2007 |
3 |
2 |
p. 61 |
artikel |
19 |
On the role of the Facilitator in information security risk assessment
|
Coles-Kemp, Lizzie |
|
|
3 |
2 |
p. 143-148 |
artikel |
20 |
On the role of the Facilitator in information security risk assessment
|
Coles-Kemp, Lizzie |
|
2007 |
3 |
2 |
p. 143-148 |
artikel |
21 |
Regular expression matching with input compression: a hardware design for use within network intrusion detection systems
|
Tripp, Gerald |
|
|
3 |
2 |
p. 125-134 |
artikel |
22 |
Regular expression matching with input compression: a hardware design for use within network intrusion detection systems
|
Tripp, Gerald |
|
2007 |
3 |
2 |
p. 125-134 |
artikel |
23 |
Rootkit detection from outside the Matrix
|
Josse, Sébastien |
|
|
3 |
2 |
p. 113-123 |
artikel |
24 |
Rootkit detection from outside the Matrix
|
Josse, Sébastien |
|
2007 |
3 |
2 |
p. 113-123 |
artikel |
25 |
Transaction pseudonyms in mobile environments
|
Jorns, Oliver |
|
|
3 |
2 |
p. 185-194 |
artikel |
26 |
Transaction pseudonyms in mobile environments
|
Jorns, Oliver |
|
2007 |
3 |
2 |
p. 185-194 |
artikel |
27 |
Usability evaluation of anti-phishing toolbars
|
Li, Linfeng |
|
|
3 |
2 |
p. 163-184 |
artikel |
28 |
Usability evaluation of anti-phishing toolbars
|
Li, Linfeng |
|
2007 |
3 |
2 |
p. 163-184 |
artikel |