Journal: Computers & Security

Volume 30, Issue 8

553 -- 554Eugene H. Spafford. Editorial for 30/8
555 -- 570Da Zhang, Chai Kiat Yeo. Distributed Court System for intrusion detection in mobile ad hoc networks
571 -- 579Trent Jaeger, Paul C. van Oorschot, Glenn Wurster. Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
580 -- 596Argyris Arnellos, Dimitrios Lekkas, Dimitrios Zissis, Thomas Spyrou, John Darzentas. Fair digital signing: The structural reliability of signed documents
597 -- 612Nayantara Mallesh, Matthew Wright. An analysis of the statistical disclosure attack and receiver-bound cover
613 -- 624Hugo Gascon, Agustín Orfila, Jorge Blasco Alís. Analysis of update delays in signature-based network intrusion detection systems
625 -- 642Constantinos Kolias, Georgios Kambourakis, M. Maragoudakis. Swarm intelligence in intrusion detection: A survey
643 -- 678Eleftheria Makri, Elisavet Konstantinou. Constant round group key agreement protocols: A comparative study
679 -- 691Nikos Mavrogiannopoulos, Nessim Kisserli, Bart Preneel. A taxonomy of self-modifying code for obfuscation
692 -- 704Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. Combining sketches and wavelet analysis for multi time-scale network anomaly detection
705 -- 718Giampaolo Bella, Rosario Giustolisi, Salvatore Riccobene. Enforcing privacy in e-commerce by balancing anonymity and trust
719 -- 731Kim-Kwang Raymond Choo. The cyber threat landscape: Challenges and future research directions
732 -- 747Lin Huang, Mark Stamp. Masquerade detection using profile hidden Markov models
748 -- 769Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu. Roles in information security - A survey and classification of the research area
770 -- 779James S. Okolica, Gilbert L. Peterson. Windows driver memory analysis: A reverse engineering methodology
780 -- 790GuangXu Zhou, Murat Demirer, Coskun Bayrak, Licheng Wang. Enable delegation for RBAC with Secure Authorization Certificate
791 -- 802Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani. Estimating botnet virulence within mathematical models of botnet propagation dynamics
803 -- 814Nigel J. Martin, John L. Rice. Cybercrime: Understanding and addressing the concerns of stakeholders
815 -- 829Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. 2: Energy efficient voice over IP privacy
830 -- 839Jung-San Lee, Ming-Huang Hsieh. An interactive mobile SMS confirmation method using secret sharing technique