Journal: Computers & Security

Volume 25, Issue 3

155 -- 0E. Eugene Schultz. Special systems: Overlooked sources of security risk?
163 -- 164Danny Bradbury. Modeling network security
165 -- 168Sebastiaan H. von Solms. Information Security - The Fourth Wave
169 -- 183Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon. Real-time analysis of intrusion detection alerts via correlation
184 -- 189Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak. A novel remote user authentication scheme using bilinear pairings
190 -- 200Wenliang Du, Mingdong Shang, Haizhi Xu. A novel approach for computer security education using Minix instructional operating system
201 -- 206Jun Shao, Zhenfu Cao. A traceable threshold signature scheme with multiple signing policies
207 -- 212John Ayoade. Security implications in RFID and authentication processing framework
213 -- 220Ming Li. Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
221 -- 228Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley. An empirical examination of the reverse engineering process for binary files
229 -- 236Guillermo González-Talaván. A simple, configurable SMTP anti-spam filter: Greylists