Journal: Computers & Security

Volume 31, Issue 5

641 -- 642Eugene H. Spafford. Editorial
643 -- 652Atif Ahmad, Justin Hadgkiss, Anthonie B. Ruighaver. Incident response teams - Challenges in supporting the organisational security function
653 -- 672Sergio Martínez, David Sánchez 0001, Aïda Valls. Semantic adaptive microaggregation of categorical microdata
673 -- 680Keshnee Padayachee. Taxonomy of compliant information security behavior
681 -- 703Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner. Securing distributed systems using patterns: A survey
704 -- 716Diqun Yan, Rangding Wang, Xianmin Yu, Jie Zhu. Steganography for MP3 audio by exploiting the rule of window switching
717 -- 726Yasin Uzun, Kemal Bicakci. A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
727 -- 735Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis
736 -- 737Jennifer L. Bayuk. A programmer's perspective
738 -- 0Manuel Leithner, Edgar R. Weippl. Low Tech Hacking