Journal: Computers & Security

Volume 26, Issue 7-8

445 -- 451Steven Furnell. An assessment of website password practices
452 -- 458Ik Rae Jeong, Dong-Hoon Lee. Key agreement for key hypergraph
459 -- 467Yang Li, Li Guo. An active learning based TCM-KNN algorithm for supervised network intrusion detection
468 -- 478P. M. Rodwell, Steven Furnell, Paul L. Reynolds. A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
479 -- 484Jianhua Yang, Shou-Hsuan Stephen Huang. Mining TCP/IP packets to detect stepping-stone intrusion
485 -- 487Danny Bradbury. The security challenges inherent in VoIP
488 -- 495Alok Sharma, Arun K. Pujari, Kuldip K. Paliwal. Intrusion detection using text processing techniques with a kernel based similarity measure
496 -- 513Florian P. Buchholz, Eugene H. Spafford. Run-time label propagation for forensic audit data