Journal: Computers & Security

Volume 31, Issue 2

149 -- 150Eugene H. Spafford. Editorial
151 -- 163Hisham Al-Assam, Sabah Jassim. Security evaluation of biometric keys
164 -- 175Hannes Holm. Performance of automated network vulnerability scanning at remediating security issues
176 -- 191Jinpeng Wei, Calton Pu. Toward a general defense against kernel queue hooking attacks
192 -- 205Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang. Multiple-File Remote Data Checking for cloud storage
206 -- 220Divakaran Liginlal, Inkook Sim, Lara Khansa, Paul Fearn. HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory
221 -- 232Hyeun-Suk Rhee, Young U. Ryu, Cheong-Tag Kim. Unrealistic optimism on information security management
233 -- 248Yu-Chi Chung, Ming-Chuan Wu, Yih-Chang Chen, Wen-Kui Chang. A Hot Query Bank approach to improve detection performance against SQL injection attacks
249 -- 250Katina Michael. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
251 -- 0Jennifer L. Bayuk. Cyber Attacks
252 -- 0Manuel Leithner, Edgar Weippl. Coding for Penetration Testers
253 -- 270Richard Macfarlane, William J. Buchanan, Elias Ekonomou, Omair Uthmani, Lu Fan, Owen Lo. Formal security policy implementations in network firewalls