Journal: Computers & Security

Volume 26, Issue 2

99 -- 0E. Eugene Schultz. Windows Vista: Microsoft s brave new world
109 -- 119Nathan L. Clarke, Steven Furnell. Advanced user authentication for mobile devices
120 -- 129Konstantina Stoupa, Athena Vakali. Clustering subjects in a credential-based access control framework
130 -- 136Michael Gaiman, Rahul Simha, Bhagirath Narahari. Privacy-preserving programming using sython
137 -- 144Jianhua Yang, Shou-Hsuan Stephen Huang. Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection
145 -- 153Sangkyun Kim, Hong Joo Lee. A study on decision consolidation methods using analytic models for security systems
154 -- 176Oleksiy Mazhelis, Seppo Puuronen. A framework for behavior-based detection of user substitution in a mobile context
177 -- 182Ilan Oshri, Julia Kotlarsky, Corey Hirsch. Information security in networkable Windows-based operating system devices: Challenges and solutions
183 -- 185Christopher J. Novak. Investigative response: After the breach