Subject Index > IT Security
- Network Anomaly Detection by Means of Machine Learning: Random Forest Approach with Apache Spark
Vol. 22, no. 4/2018 - IoT Security Approaches in Oil & Gas Solution Industry 4.0
Vol. 22, no. 3/2018 - Web Applications Vulnerability Management using a Quantitative Stochastic Risk Modeling Method
Vol. 21, no. 3/2017 - Using Ontologies in Cybersecurity Field
Vol. 21, no. 3/2017 - Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment
Vol. 20, no. 3/2016 - Implementation of a Test Data Generator based on DSL Files
Vol. 20, no. 2/2016 - Data Security in Smart Cities: Challenges and Solutions
Vol. 20, no. 1/2016 - Indicators for Determining Collaborative Security Level in Organizational Environments
Vol. 18, no. 4/2014 - Social Engineering a General Approach
Vol. 18, no. 2/2014 - Using Binary Code Instrumentation in Computer Security
Vol. 17, no. 4/2013 - Contribution to Research on Securitization: Assessment of SCI and SSCI Articles from 1996 To 2012
Vol. 17, no. 4/2013 - Increasing Distributed IT&C Application Security
Vol. 17, no. 2/2013 - Requirements of a Better Secure Program Coding
Vol. 16, no. 4/2012 - Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level
Vol. 16, no. 2/2012 - Cyber Security Scenarios and Control for Small and Medium Enterprises
Vol. 16, no. 2/2012 - Android Applications Security
Vol. 15, no. 3/2011 - A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications
Vol. 15, no. 2/2011 - Prototype of Intrusion Detection Model using UML 5.0 and Forward Engineering
Vol. 15, no. 2/2011 - Security Risk Management - Approaches and Methodology
Vol. 15, no. 1/2011 - IT Solution for Security Management in the Cadastral Field
Vol. 15, no. 1/2011 - Practical Methods for Information Security Risk Management
Vol. 15, no. 1/2011 - Reliability and Security - Convergence or Divergence
Vol. 14, no. 4/2010 - Security Optimization for Distributed Applications
Oriented on Very Large Data Sets
Vol. 14, no. 2/2010 - Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions
Vol. 14, no. 2/2010 - A Missing Piece of RSS Technology
Vol. 13, no. 3/2009 - Detection of the Security Vulnerabilities in Web Applications
Vol. 13, no. 1/2009 - Enhancing Privacy for Biometric Identification Cards
Vol. 13, no. 1/2009 - Structure Refinement for Vulnerability Estimation Models using Genetic Algorithm Based Model Generators
Vol. 13, no. 1/2009 - Biometric Security for Cell Phones
Vol. 13, no. 1/2009 - V-Model Role Engineering
Vol. 13, no. 1/2009 - Security Issues of the Digital Certificates within Public Key Infrastructures
Vol. 13, no. 1/2009 - The Network’s Data Security Risk Analysis
Vol. XII, no. 4/2008 - Intrusion Detection using Open Source Tools
Vol. XII, no. 2/2008 - Firewall Technologies
Vol. XI, no. 4/2007 - Particularities of security design for wireless networks in small and medium business (SMB)
Vol. XI, no. 4/2007 - Secure Architectures for Mobile Applications
Vol. XI, no. 4/2007 - Risk Assessment Generated by Usage of ICT and Information Security Measures
Vol. X, no. 4/2006 - Hybrid Security Policies
Vol. X, no. 3/2006 - Secure Distributed Databases Using Cryptography
Vol. X, no. 3/2006 - Security Planning in IT Systems
Vol. X, no. 1/2006