Journal: Computers & Security

Volume 23, Issue 1

1 -- 2E. Eugene Schultz. Security training and awareness - fitting a square peg in a round hole
12 -- 16Marcus K. Rogers, Kate Seigfried. The future of computer forensics: a needs analysis survey
17 -- 21Stuart King. Applying application security standards - a case study
22 -- 28John Leach. TBSE - an engineering approach to the design of accurate and reliable security systems
31 -- 42Ronald F. DeMara, Adam J. Rocke. Mitigation of network tampering using dynamic dispatch of mobile agents
43 -- 51Soumyo D. Moitra, Suresh L. Konda. An empirical investigation of network attacks on computer systems
52 -- 62Vinícius da Silveira Serafim, Raul Fernando Weber. Restraining and repairing file system damage through file integrity control
63 -- 76Albin Zuccato. Holistic security requirement engineering for electronic commerce
77 -- 84Janusz Szczepanski, Elek Wajnryb, José M. Amigó, Maria V. Sanchez-Vives, Mel Slater. Biometric random number generators
85 -- 0Brian McKenna. Erratum to Attacks on the (enhanced) Yang-Shieh authentication [Comput Secur 22(8) (2003) 725-727]