Journal: Computers & Security

Volume 27, Issue 5-6

123 -- 0Stephen D. Wolthusen. From the Editor-in-Chief
124 -- 135Mariana Gerber, Rossouw von Solms. Information security requirements - Interpreting the legal aspects
136 -- 153Dimitris Gritzalis, Yannis Mallios. A SIP-oriented SPIT Management Framework
154 -- 167Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff. SMSSec: An end-to-end protocol for secure SMS
168 -- 175Rachid Beghdad. Critical study of neural networks in detecting intrusions
176 -- 187Wes Masri, Andy Podgurski. Application-based anomaly intrusion detection with dynamic information flow analysis
188 -- 196Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan. Building network attack graph for alert causal correlation
197 -- 215Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timothy E. Levin. Enforcing memory policy specifications in reconfigurable hardware
216 -- 223Hung-Yu Chien. Practical anonymous user authentication scheme with security proof
224 -- 231E. Kritzinger, E. Smith. Information security management: An information security retrieval and awareness model for industry