Journal: Computers & Security

Volume 25, Issue 4

237 -- 0E. Eugene Schultz. Representing information security fairly and accurately
247 -- 256Reinhardt A. Botha, Tshepo G. Gaadingwe. Reflecting on 20 SEC conferences
257 -- 264Richard Ford, Mark Bush, Alexander Bulatov. Predation and the cost of replication: New approaches to malware prevention?
265 -- 273Wee Hock Desmond Ng, Haitham S. Cruickshank, Zhili Sun. Scalable balanced batch rekeying for secure group communication
274 -- 288Hassan Artail, Haïdar Safa, Malek Sraj, Iyad Kuwatly, Zaid Al Masri. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
289 -- 296H. A. Kruger, W. D. Kearney. A prototype for assessing information security awareness
297 -- 306Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki. Design of an enhancement for SSL/TLS protocols
307 -- 314Chin-Chen Chang, Jung-San Lee. An anonymous voting mechanism based on the key exchange protocol