Abstract is missing.
- Cyberpatterns: Towards a Pattern Oriented Study of CyberspaceHong Zhu. 3-15 [doi]
- Towards a Conceptual Framework for Security PatternsClive Blackwell. 17-34 [doi]
- Design Patterns: Applications and Open IssuesKevin Lano. 37-45 [doi]
- Challenges for a Formal Framework for PatternsIan Bayley. 47-55 [doi]
- Towards a General Theory of PatternsHong Zhu. 57-69 [doi]
- Extending AOP Principles for the Description of Network Security PatternsDavid Llewellyn-Jones, Qi Shi, Madjid Merabti. 73-84 [doi]
- Management Patterns for Network Resilience: Design and Verification of Policy ConfigurationsAlberto E. Schaeffer Filho, Paul Smith, Andreas Mauthe, David Hutchison. 85-95 [doi]
- A Heuristic Approach for Secure Service Composition AdaptationBo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti. 97-105 [doi]
- A Strategy for Structuring and Formalising Attack PatternsClive Blackwell. 111-123 [doi]
- Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer NetworksNoor-ul-Hassan Shirazi, Alberto E. Schaeffer Filho, David Hutchison. 125-134 [doi]
- Towards a Penetration Testing Framework Using Attack PatternsClive Blackwell. 135-148 [doi]
- A Method for Resolving Security Vulnerabilities Through the Use of Design PatternsNick Walker, Natalie Coull, Ian Ferguson, Allan Milne. 149-155 [doi]
- 'Weird Machine' PatternsSergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina, Michael E. Locasto, Daniel Bilar. 157-171 [doi]
- Towards a Simulation of Information Security Behaviour in OrganisationsMartin Ruskov, Paul Ekblom, M. Angela Sasse. 177-184 [doi]
- Security Design Patterns in the MASTER WorkbenchPaul J. Kearney, David A. Sinclair, Sebastian Wagner 0001. 185-197 [doi]
- Evaluating the Implications of Attack and Security Patterns with PremortemsShamal Faily, Simon Parkin, John Lyle. 199-209 [doi]
- An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic ContextFaye Rona Mitchell. 215-222 [doi]
- Partitional Clustering of Malware Using K-MeansRenato Cordeiro de Amorim, Peter Komisarczuk. 223-233 [doi]
- Dynamic Monitoring of Composed ServicesMuhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti. 235-245 [doi]
- Where has this Hard Disk Been?: Extracting Geospatial Intelligence from Digital Storage SystemsHarjinder Singh Lallie, Nathan Griffiths. 247-255 [doi]
- Future Directions for Research on CyberpatternsClive Blackwell, Hong Zhu. 259-264 [doi]