![]() |
| 2003 | ||
|---|---|---|
| 5 | EE | H. J. A. (Rens) de Wolf, Marcel E. M. Spruit: Stealth tracing: Subliminal Traceroute. Inf. Manag. Comput. Security 11(3): 123-129 (2003) |
| 2002 | ||
| 4 | EE | J. C. W. Hendriks, Marcel E. M. Spruit, Maarten Looijen: Network management abroad. Int. Journal of Network Management 12(5): 303-316 (2002) |
| 1999 | ||
| 3 | P. H. Samwel, Marcel E. M. Spruit: A practical approach to manage data communication security. Conference on Information Security Management & Small Systems Security 1999: 29-40 | |
| 2 | Marcel E. M. Spruit, P. H. Samwel: Risk analysis on Internet connection. Conference on Information Security Management & Small Systems Security 1999: 89-102 | |
| 1996 | ||
| 1 | EE | Marcel E. M. Spruit, Maarten Looijen: IT security in Dutch practice. Computers & Security 15(2): 157-170 (1996) |
| 1 | J. C. W. Hendriks | [4] |
| 2 | Maarten Looijen | [1] [4] |
| 3 | P. H. Samwel | [2] [3] |
| 4 | H. J. A. (Rens) de Wolf | [5] |