Journal: Computers & Security

Volume 29, Issue 6

641 -- 642Eugene H. Spafford. Editorial
643 -- 658Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis. A multi-layer Criticality Assessment methodology based on interdependencies
659 -- 679Teodor Sommestad, Mathias Ekstedt, Pontus Johnson. A probabilistic relational model for security risk analysis
680 -- 685Theodoros Kavallaris, Vasilios Katos. On the detection of pod slurping attacks
686 -- 696Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li. Implementing a passive network covert timing channel
697 -- 711M. Francisca Hinarejos, Jose L. Muñoz, Jordi Forné, Oscar Esparza. PREON: An efficient cascade revocation mechanism for delegation paths
712 -- 723Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm