Journal: Computers & Security

Volume 24, Issue 4

261 -- 262E. Eugene Schultz. Personal information compromises: It is time for the U.S. Government to wake up
263 -- 270. Security views
271 -- 273Basie von Solms, Rossouw von Solms. From information security to ... business security?
274 -- 279Steven Furnell. Why users cannot use security
280 -- 286David B. Chang, Carl S. Young. Infection dynamics on the Internet
287 -- 294Wenbao Jiang, Hua Song, Yiqi Dai. Real-time intrusion detection for high-speed networks
295 -- 307Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas. Feature deduction and ensemble design of intrusion detection systems
308 -- 321Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. Secure information systems development - a survey and comparison
322 -- 333Giampaolo Bella, Stefano Bistarelli. Information Assurance for security protocols
334 -- 346Sihan Qing, Weiping Wen. A survey and trends on Internet worms