Journal: Computers & Security

Volume 26, Issue 5

349 -- 360Hamid Reza Shahriari, Rasool Jalili. Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
361 -- 372Guido Schryen. The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis
373 -- 380Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris. Authentication in a layered security approach for mobile ad hoc networks
381 -- 390Chih-Chien Wang, Sheng-Yi Chen. Using header session messages to anti-spamming
391 -- 400Xosé A. Vila Sobrino, A. Schuster, Adolfo Riera. Security for a Multi-Agent System based on JADE
401 -- 409Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN
410 -- 417Steven Furnell, P. Bryant, Andrew D. Phippen. Assessing the security perceptions of personal Internet users