Journal: Computers & Security

Volume 24, Issue 7

505 -- 506E. Eugene Schultz. Aligning disaster recovery and security incident response
507 -- 515. Security views - Malware update
519 -- 527Nathan L. Clarke, Steven Furnell. Authentication of users on mobile telephones - A survey of attitudes and practices
529 -- 545Vaibhav Gowadia, Csilla Farkas, Marco Valtorta. PAID: A Probabilistic Agent-Based Intrusion Detection system
546 -- 560Lawrence O Gorman, Amit Bagga, Jon Louis Bentley. Query-directed passwords
561 -- 570H. Chris Tseng, Benjamin Jack Culpepper. Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators
571 -- 586Fu-Yuan Lee, Shiuh-Pyng Shieh. Defending against spoofed DDoS attacks with path fingerprint