Journal: Computers & Security

Volume 26, Issue 4

267 -- 268E. Eugene Schultz. Struggles in the academic side of infosec
276 -- 289Eirik Albrechtsen. A qualitative study of users view on information security
290 -- 299Sushil K. Sharma, Joshua Sefchek. Teaching information systems security courses: A hands-onapproach
300 -- 310Hyoungjoo Lee, Sungzoon Cho. Retraining a keystroke dynamics-based authenticator with impostor patterns
311 -- 318Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura. Masquerade detection by boosting decision stumps using UNIX commands
319 -- 330Ming-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang. Dual-wrapped digital watermarking scheme for image copyright protection
331 -- 337Yuh-Min Tseng. A resource-constrained group key agreement protocol for imbalanced wireless networks
338 -- 347Jun Li, Paul Knickerbocker. Functional similarities between computer worms and biological pathogens