Journal: Computers & Security

Volume 29, Issue 1

1 -- 2Dimitris Gritzalis, Jan H. P. Eloff. Editorial
3 -- 15Fuwen Liu, Hartmut König. A survey of video encryption algorithms
16 -- 34Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis. An intruder model with message inspection for model checking security protocols
35 -- 44Georgios P. Spathoulas, Sokratis K. Katsikas. Reducing false positives in intrusion detection systems
45 -- 58Alexander K. Seewald, Wilfried N. Gansterer. On the detection and identification of botnets
59 -- 73Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri. Anonymization models for directional location based service environments
74 -- 87Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter. Runtime monitoring for next generation Java ME platform
88 -- 103Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman. The inference problem: Maintaining maximal availability in the presence of database updates
104 -- 123Yoon Ho Choi, Lunquan Li, Peng Liu, George Kesidis. Worm virulence estimation for the containment of local worm outbreak
124 -- 140Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. A survey of coordinated attacks and collaborative intrusion detection
141 -- 157Carlos Javier Hernandez-Castro, Arturo Ribagorda. Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study