Journal: Computers & Security

Volume 26, Issue 6

421 -- 426Stuart P. Goring, Joseph R. Rabaiotti, Antonia J. Jones. Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences
427 -- 433Ming Yu, Xi-Yuan Zhou. An adaptive method for anomaly detection in symmetric network traffic
434 -- 443Steven Furnell. Making security usable: Are things improving?