Journal: Computers & Security

Volume 28, Issue 6

325 -- 326Dimitris Gritzalis, Javier Lopez. Editorial
327 -- 340Siddharth Bhatt, Radu Sion, Bogdan Carbunar. A personal mobile DRM manager for smartphones
341 -- 358Azzam Mourad, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi. New aspect-oriented constructs for security hardening concerns
359 -- 380Djamel Fawzi Hadj Sadok, Eduardo Souto, Eduardo Feitosa, Judith Kelner, Lars Westberg. RIP - A robust IP access architecture
381 -- 394Michael Edward Edge, Pedro R. Falcone Sampaio. A survey of signature based methods for financial fraud detection
395 -- 409Ibrahim Kamel, Qutaiba Albluwi. A robust software watermarking for copyright protection
410 -- 420Mohammad Mannan, Paul C. van Oorschot. Reducing threats from flawed security APIs: The banking PIN case
421 -- 432Joon Son, Jim Alves-Foss. A formal framework for real-time information flow analysis
433 -- 449Francesco Palmieri, Ugo Fiore. Providing true end-to-end security in converged voice over IP infrastructures
450 -- 465Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou. Probabilistic model checking for the quantification of DoS security threats
466 -- 475Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu, Chen Young. Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
476 -- 490Eirik Albrechtsen, Jan Hovden. The information security digital divide between information security managers and users