The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
<
Volume 64,
Issue 1
Volume 31,
Issue 8
Volume 31,
Issue 7
Volume 31,
Issue 6
Volume 31,
Issue 5
Volume 31,
Issue 4
Volume 31,
Issue 3
Volume 31,
Issue 2
Volume 31,
Issue 1
Volume 30,
Issue 8
Volume 30,
Issue 7
Volume 30,
Issue 6
Volume 30,
Issue 5
Volume 30,
Issue 4
Volume 30,
Issue 3
Volume 30,
Issue 2
Volume 30,
Issue 1
Volume 29,
Issue 8
Volume 29,
Issue 7
Volume 29,
Issue 6
Volume 29,
Issue 5
Volume 29,
Issue 4
Volume 29,
Issue 3
Volume 29,
Issue 2
Volume 29,
Issue 1
Volume 28,
Issue 8
Volume 28,
Issue 7
Volume 28,
Issue 6
Volume 28,
Issue 5
Volume 28,
Issue 4
Volume 28,
Issue 3
Volume 28,
Issue 2
Volume 28,
Issue 1
Volume 27,
Issue 8
Volume 27,
Issue 7
Volume 27,
Issue 6
Volume 27,
Issue 5
Volume 27,
Issue 4
Volume 27,
Issue 3
Volume 27,
Issue 2
Volume 27,
Issue 1
Volume 26,
Issue 8
Volume 26,
Issue 7
Volume 26,
Issue 6
Volume 26,
Issue 5
Volume 26,
Issue 4
Volume 26,
Issue 3
Volume 26,
Issue 2
Volume 26,
Issue 1
Volume 25,
Issue 8
Volume 25,
Issue 7
Volume 25,
Issue 6
Volume 25,
Issue 5
Volume 25,
Issue 4
Volume 25,
Issue 3
Volume 25,
Issue 2
Volume 25,
Issue 1
Volume 24,
Issue 8
Volume 24,
Issue 7
Volume 24,
Issue 6
Volume 24,
Issue 5
Volume 24,
Issue 4
Volume 24,
Issue 3
Volume 24,
Issue 2
Volume 24,
Issue 1
Volume 23,
Issue 8
Volume 23,
Issue 7
Volume 23,
Issue 6
Volume 23,
Issue 5
Volume 23,
Issue 4
Volume 23,
Issue 3
Volume 23,
Issue 2
Volume 23,
Issue 1
Volume 22,
Issue 8
Volume 22,
Issue 7
Volume 22,
Issue 6
Volume 22,
Issue 5
Volume 22,
Issue 4
Volume 22,
Issue 3
Volume 22,
Issue 2
Volume 22,
Issue 1
Volume 21,
Issue 8
Volume 21,
Issue 7
Volume 21,
Issue 6
Volume 21,
Issue 5
Volume 21,
Issue 4
Volume 21,
Issue 3
Volume 21,
Issue 2
Volume 21,
Issue 1
Volume 20,
Issue 8
Volume 20,
Issue 7
Volume 20,
Issue 6
Volume 20,
Issue 5
Volume 20,
Issue 4
Volume 20,
Issue 3
Volume 20,
Issue 2
Volume 20,
Issue 1
Volume 19,
Issue 8
Volume 19,
Issue 7
Volume 19,
Issue 6
Volume 19,
Issue 5
Volume 19,
Issue 4
Volume 19,
Issue 3
Volume 19,
Issue 2
Volume 19,
Issue 1
Volume 18,
Issue 8
Volume 18,
Issue 7
Volume 18,
Issue 6
Volume 18,
Issue 5
Volume 18,
Issue 4
Volume 18,
Issue 3
Volume 18,
Issue 2
Volume 18,
Issue 1
Volume 17,
Issue 8
Volume 17,
Issue 7
Volume 17,
Issue 6
Volume 17,
Issue 5
Volume 17,
Issue 4
Volume 17,
Issue 3
Volume 17,
Issue 2
Volume 17,
Issue 1
Volume 16,
Issue 8
Volume 16,
Issue 7
Volume 16,
Issue 6
Volume 16,
Issue 5
Volume 16,
Issue 4
Volume 16,
Issue 3
Volume 16,
Issue 2
Volume 16,
Issue 1
Volume 15,
Issue 8
Volume 15,
Issue 7
Volume 15,
Issue 6
Volume 15,
Issue 5
Volume 15,
Issue 4
Volume 15,
Issue 3
Volume 15,
Issue 2
Volume 15,
Issue 1
Volume 14,
Issue 8
Volume 14,
Issue 7
Volume 14,
Issue 6
Volume 14,
Issue 5
Volume 14,
Issue 4
Volume 14,
Issue 3
Volume 14,
Issue 2
Volume 14,
Issue 1
Volume 13,
Issue 8
Volume 13,
Issue 7
Volume 13,
Issue 6
Volume 13,
Issue 5
Volume 13,
Issue 4
Volume 13,
Issue 3
Volume 13,
Issue 2
Volume 13,
Issue 1
Volume 12,
Issue 8
Volume 12,
Issue 7
Volume 12,
Issue 6
Volume 12,
Issue 5
Volume 12,
Issue 4
Volume 12,
Issue 3
Volume 12,
Issue 2
Volume 12,
Issue 1
Volume 11,
Issue 8
Volume 11,
Issue 7
Volume 11,
Issue 6
Volume 11,
Issue 5
Volume 11,
Issue 4
Volume 11,
Issue 3
Volume 11,
Issue 2
Volume 11,
Issue 1
Volume 10,
Issue 8
Volume 10,
Issue 7
Volume 10,
Issue 6
Volume 10,
Issue 5
Volume 10,
Issue 4
Volume 10,
Issue 3
Volume 10,
Issue 2
Volume 10,
Issue 1
Volume 9,
Issue 8
Volume 9,
Issue 7
Volume 9,
Issue 6
Volume 9,
Issue 5
Volume 9,
Issue 4
Volume 9,
Issue 3
Volume 9,
Issue 2
Volume 9,
Issue 1
Volume 8,
Issue 8
Volume 8,
Issue 7
Volume 8,
Issue 6
Volume 8,
Issue 5
Volume 8,
Issue 4
Volume 8,
Issue 3
Volume 8,
Issue 2
Volume 8,
Issue 1
Volume 7,
Issue 6
Volume 7,
Issue 5
Volume 7,
Issue 4
Volume 7,
Issue 3
Volume 7,
Issue 2
Volume 7,
Issue 1
Volume 6,
Issue 6
Volume 6,
Issue 5
Volume 6,
Issue 4
Volume 6,
Issue 3
Volume 6,
Issue 2
Volume 6,
Issue 1
Volume 5,
Issue 4
Volume 5,
Issue 3
Volume 5,
Issue 2
Volume 5,
Issue 1
Volume 4,
Issue 4
Volume 4,
Issue 3
Volume 4,
Issue 2
Volume 4,
Issue 1
Volume 3,
Issue 4
Volume 3,
Issue 3
Volume 3,
Issue 2
Volume 3,
Issue 1
Volume 2,
Issue 3
Volume 2,
Issue 2
Volume 2,
Issue 1
Volume 1,
Issue 3
Volume 1,
Issue 2
Volume 1,
Issue 1
>
Table of contents
187
Mobile computing: The next Pandora's Box
Schultz, E. Eugene
et al.
| 2007
188
Malware update
| 2007
201
SVision: A novel visual network-anomaly identification technique
Onut, Iosif-Viorel
/ Ghorbani, Ali A.
et al.
| 2006
213
Modeling and analyzing the spread of active worms based on P2P systems
Li, Tao
/ Guan, Zhihong
/ Wu, Xianyong
et al.
| 2006
219
Measuring, analyzing and predicting security vulnerabilities in software systems
Alhazmi, O.H.
/ Malaiya, Y.K.
/ Ray, I.
et al.
| 2006
229
Evaluating information security tradeoffs: Restricting access can interfere with user tasks
Post, Gerald V.
/ Kagan, Albert
et al.
| 2006
238
M-CLIQUES: Modified CLIQUES key agreement for secure multicast
Chen, Xiaoyan
/ Ma, Bobby N.W.
/ Yang, Cungang
et al.
| 2006
246
Adaptable security mechanism for dynamic environments
Księżopolski, Bogdan
/ Kotulski, Zbigniew
et al.
| 2006
256
Holistic security management framework applied in electronic commerce
Zuccato, Albin
et al.
| 2006
IFC
IFC - Editorial Board
| 2007
iii
(iii) Contents
| 2007
IV
Guide for Authors.
| 2007