Abstract is missing.
- JMD: A Hybrid Approach for Detecting Java MalwareAdrian Herrera, Ben Cheney. 3-13 [doi]
- Hypervisor-based Security Architecture to Protect Web ApplicationsDilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan. 15-24 [doi]
- Annex: A Middleware for Constructing High-Assurance Software SystemsTristan Newby, Duncan A. Grove, Alex Murray, Chris A. Owen, Jim McCarthy, Chris J. North. 25-34 [doi]
- On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit DetectionToby J. Richer, Grant Neale, Grant Osborne. 35-44 [doi]
- Hardware Trojans - A Systemic ThreatJohn Shield, Bradley D. Hopkins, Mark R. Beaumont, Chris J. North. 45-51 [doi]
- Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical AnalysisDeepa Mani, Alireza Heravi, Kim-Kwang Raymond Choo, Sameera Mubarak. 53-56 [doi]
- Correcting flaws in Mitchell's analysis of EPBCBinbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. 57-60 [doi]
- Internet-wide Scanning Taxonomy and FrameworkDavid Myers, Ernest Foo, Kenneth Radke. 61-65 [doi]
- Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using ScapyNicholas R. Rodofile, Kenneth Radke, Ernest Foo. 67-70 [doi]