Journal: Computers & Security

Volume 24, Issue 5

347 -- 348E. Eugene Schultz. Non-infosec professionals in infosec?
349 -- 358E. Eugene Schultz. Security views
359 -- 361Richard LeVine. Technology evolution drives need for greater information technology security
362 -- 363C. Andrew. The five Ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy?
364 -- 370Alex Biryukov, Joseph Lano, Bart Preneel. Recent attacks on alleged SecurID and their practical implications
371 -- 380G. Magklaras, Steven Furnell. A preliminary model of end user sophistication for insider threat prediction in IT systems
381 -- 386Chou Chen Yang, Ren-Chiun Wang, Wei-Ting Liu. Secure authentication scheme for session initiation protocol
387 -- 398D. DasGupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii. CIDS: An agent-based intrusion detection system
399 -- 408Heba Kamal Aslan. Two-level controllers hierarchy for a scalable and distributed multicast security protocol
409 -- 424Anat Hovav, John D Arcy. Capital market reaction to defective IT products: The case of computer viruses