Journal: Computers & Security

Volume 30, Issue 6-7

351 -- 352Eugene H. Spafford. Editorial
353 -- 375Jonathan J. Davis, Andrew J. Clark. Data preprocessing for anomaly based network intrusion detection: A review
376 -- 396Slim Rekhis, Noureddine Boudriga. Logic-based approach for digital forensic investigation in communication Networks
397 -- 409Ignacio J. Martinez-Moyano, Stephen H. Conrad, David F. Andersen. Modeling behavioral considerations related to information security
410 -- 426Klaus Julisch, Christophe Suter, Thomas Woitalla, Olaf Zimmermann. Compliance by design - Bridging the chasm between auditors and IT architects
427 -- 445Romain Giot, Mohamad El-Abed, Baptiste Hemery, Christophe Rosenberger. Unconstrained keystroke dynamics authentication with shared secret
446 -- 463Fernando Pereñiguez-Garcia, Rafael Marín López, Georgios Kambourakis, Stefanos Gritzalis, Antonio F. Gómez-Skarmeta. PrivaKERB: A user privacy framework for Kerberos
464 -- 485Arne Tauber. A survey of certified mail systems provided on the Internet
486 -- 497Clay Posey, Rebecca J. Bennett, Tom L. Roberts. Understanding the mindset of the abusive insider: An examination of insiders causal reasoning following internal security changes
498 -- 513Amit Sachan, Sabu Emmanuel. Rights violation detection in multi-level digital rights management system
514 -- 524Ding Yuxin, Yuan Xuebing, Zhou Di, Dong Li, An Zhanchao. Feature representation and selection in malicious code detection methods based on static system calls
525 -- 537Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi. Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks
538 -- 546Jianhua Yang, David Woolbright. Correlating TCP/IP Packet contexts to detect stepping-stone intrusion