Journal: Computers & Security

Volume 30, Issue 1

1 -- 0Eugene H. Spafford. Editorial
2 -- 3Eugene H. Spafford. Security, technology, publishing, and ethics (part II)
4 -- 12Zac Sadan, David G. Schwartz. WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure
13 -- 27Qijun Gu, Christopher Ferguson, Rizwan Noorani. A study of self-propagating mal-packets in sensor networks: Attacks and defenses
28 -- 34Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang. An efficient and non-interactive hierarchical key agreement protocol
35 -- 49Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza. Designing a cluster-based covert channel to evade disk investigation and forensics
50 -- 62Sung-Whan Woo, HyunChul Joh, Omar H. Alhazmi, Yashwant K. Malaiya. Modeling vulnerability discovery process in Apache and IIS HTTP servers
63 -- 80Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks