Journal: Computers & Security

Volume 26, Issue 3

187 -- 0E. Eugene Schultz. Mobile computing: The next Pandora s Box
201 -- 212Iosif-Viorel Onut, Ali A. Ghorbani. SVision: A novel visual network-anomaly identification technique
213 -- 218Tao Li, Zhihong Guan, Xianyong Wu. Modeling and analyzing the spread of active worms based on P2P systems
219 -- 228Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray. Measuring, analyzing and predicting security vulnerabilities in software systems
229 -- 237Gerald V. Post, Albert Kagan. Evaluating information security tradeoffs: Restricting access can interfere with user tasks
238 -- 245Xiaoyan Chen, Bobby N. W. Ma, Cungang Yang. M-CLIQUES: Modified CLIQUES key agreement for secure multicast
246 -- 255Bogdan Ksiezopolski, Zbigniew Kotulski. Adaptable security mechanism for dynamic environments
256 -- 265Albin Zuccato. Holistic security management framework applied in electronic commerce