Journal: Computers & Security

Volume 14, Issue 7

574 -- 585Harold Joseph Highland. Random bits & bytes
587 -- 598Christopher L. J. Holloway. Controlling the use of cryptographic keys
599 -- 604Sarah Gordon. Internet 101
621 -- 631Ben Soh, Tharam S. Dillon. Setting optimal intrusion-detection thresholds
633 -- 643Fred de Koning. A methodology for the design of security plans
645 -- 651James Backhouse, Gurpreet Dhillon. Managing computer crime: a research outlook