Journal: Computers & Security

Volume 24, Issue 8

587 -- 588E. Eugene Schultz. Infosec certification: Which way do we turn from here?
589 -- 598E. Eugene Schultz. Security views
599 -- 603Nathan Friess, Ryan Vogt, John Aycock. Timing is everything
604 -- 613Stephen Flowerday, Rossouw von Solms. Real-time information integrity = system integrity + data integrity + continuous assurances
614 -- 617Haralambos Mouratidis. Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS 05)
619 -- 628Chun-I Fan, Yung-Cheng Chan, Zhi-Kai Zhang. Robust remote authentication scheme with smart cards
629 -- 641Jun Jiang, Chen He, Ling-ge Jiang. A novel mix-based location privacy mechanism in Mobile IPv6
642 -- 652Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli. SEAS, a secure e-voting protocol: Design and implementation
653 -- 661Chuan-Kun Wu. Hash channels
662 -- 674Yun Wang. A multinomial logistic regression modeling approach for anomaly intrusion detection

Volume 24, Issue 7

505 -- 506E. Eugene Schultz. Aligning disaster recovery and security incident response
507 -- 515. Security views - Malware update
519 -- 527Nathan L. Clarke, Steven Furnell. Authentication of users on mobile telephones - A survey of attitudes and practices
529 -- 545Vaibhav Gowadia, Csilla Farkas, Marco Valtorta. PAID: A Probabilistic Agent-Based Intrusion Detection system
546 -- 560Lawrence O Gorman, Amit Bagga, Jon Louis Bentley. Query-directed passwords
561 -- 570H. Chris Tseng, Benjamin Jack Culpepper. Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators
571 -- 586Fu-Yuan Lee, Shiuh-Pyng Shieh. Defending against spoofed DDoS attacks with path fingerprint

Volume 24, Issue 6

425 -- 426E. Eugene Schultz. The human factor in security
427 -- 436E. Eugene Schultz. Security views
437 -- 439C. Pollard. Telecom fraud: The cost of doing nothing just went up
440 -- 442Steven A. Hofmeyr. Host intrusion prevention: Part of the operating system or on top of the operating system?
443 -- 447Basie von Solms. Information Security Governance - Compliance management vs operational management
448 -- 459Terry L. Wiant. Information security policy s impact on reporting security incidents
460 -- 471Hsien-Chu Wu, Chin-Chen Chang. A novel digital image watermarking scheme based on the vector quantization technique
472 -- 484Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis. The insider threat to information systems and the effectiveness of ISO17799
485 -- 491Wolfgang Fischer, Niels Lepperhoff. Can critical infrastructures rely on the Internet?
492 -- 499Philip Machanick. A distributed systems approach to secure Internet mail
500 -- 504Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu. Improvement on the flexible tree-based key management framework

Volume 24, Issue 5

347 -- 348E. Eugene Schultz. Non-infosec professionals in infosec?
349 -- 358E. Eugene Schultz. Security views
359 -- 361Richard LeVine. Technology evolution drives need for greater information technology security
362 -- 363C. Andrew. The five Ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy?
364 -- 370Alex Biryukov, Joseph Lano, Bart Preneel. Recent attacks on alleged SecurID and their practical implications
371 -- 380G. Magklaras, Steven Furnell. A preliminary model of end user sophistication for insider threat prediction in IT systems
381 -- 386Chou Chen Yang, Ren-Chiun Wang, Wei-Ting Liu. Secure authentication scheme for session initiation protocol
387 -- 398D. DasGupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii. CIDS: An agent-based intrusion detection system
399 -- 408Heba Kamal Aslan. Two-level controllers hierarchy for a scalable and distributed multicast security protocol
409 -- 424Anat Hovav, John D Arcy. Capital market reaction to defective IT products: The case of computer viruses

Volume 24, Issue 4

261 -- 262E. Eugene Schultz. Personal information compromises: It is time for the U.S. Government to wake up
263 -- 270. Security views
271 -- 273Basie von Solms, Rossouw von Solms. From information security to ... business security?
274 -- 279Steven Furnell. Why users cannot use security
280 -- 286David B. Chang, Carl S. Young. Infection dynamics on the Internet
287 -- 294Wenbao Jiang, Hua Song, Yiqi Dai. Real-time intrusion detection for high-speed networks
295 -- 307Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas. Feature deduction and ensemble design of intrusion detection systems
308 -- 321Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. Secure information systems development - a survey and comparison
322 -- 333Giampaolo Bella, Stefano Bistarelli. Information Assurance for security protocols
334 -- 346Sihan Qing, Weiping Wen. A survey and trends on Internet worms

Volume 24, Issue 3

175 -- 176E. Eugene Schultz. Security dilemmas with Microsoft s Internet Explorer
177 -- 187. Security views - Malware update
188 -- 191. Smart card based authentication - any future?
192 -- 207Almut Herzog, Nahid Shahmehri. Performance of the Java security manager
208 -- 217Faisal Nabi. Secure business application logic for e-commerce systems
218 -- 231Xiu-Zhen Chen, Qing-Hua Zheng, Xiao-Hong Guan, Chen-Guang Lin, Jie Sun. Multiple behavior information fusion based quantitative threat evaluation
232 -- 245Konstantinos Rantos, Chris J. Mitchell. Matching key recovery mechanisms to business requirements
246 -- 260Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis. Information systems security policies: a contextual perspective

Volume 24, Issue 2

87 -- 88E. Eugene Schultz. Search engines: a growing contributor to security risk
89 -- 90E. Eugene Schultz. Lycos crosses the line
99 -- 104Basie von Solms. Information Security governance: COBIT or ISO 17799 or both?
105 -- 108Theodosios Tsiakis, George Stephanides. The economic approach of information security
109 -- 123John Marchesini, Sean W. Smith, Meiyuan Zhao. Keyjacking: the surprising insecurity of client-side SSL
124 -- 133Jeffrey M. Stanton, Kathryn R. Stam, Paul Mastrangelo, Jeffrey Jolton. Analysis of end user security behaviors
134 -- 138Shyh-Yih Wang, Chi-Sung Laih. Cryptanalyses of two key assignment schemes based on polynomial interpolations
139 -- 146Francesco Bergadano, Davide Cavagnino. Dealing with packet loss in the Interactive Chained Stream Authentication protocol
147 -- 159Bilge Karabacak, Ibrahim Sogukpinar. ISRAM: information security risk analysis method
160 -- 168Han-Sung Kim, Sung Deok Cha. Empirical evaluation of SVM-based masquerade detection using UNIX commands
169 -- 174Rui Jiang, Li Pan, Jianhua Li. An improvement on efficient anonymous auction protocols

Volume 24, Issue 1

10 -- 15Theodosios Tsiakis, George Stephanides. The concept of security and trust in electronic payments
16 -- 30Mariana Gerber, Rossouw von Solms. Management of risk in the information age
31 -- 43Simon Hansman, Ray Hunt. A taxonomy of network and computer attacks
44 -- 49Tianjie Cao, Dongdai Lin, Rui Xue. A randomized RSA-based partially blind signature scheme for electronic cash
50 -- 56Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. An improvement of Hwang-Lee-Tang s simple remote user authentication scheme
57 -- 68Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar. H::2::A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming
69 -- 75Kerry-Lynn Thomson, Rossouw von Solms. Information security obedience: a definition
76 -- 82Ruishan Zhang, Kefei Chen. Improvements on the WTLS protocol to avoid denial of service attacks
83 -- 86Che Wun Chiou, Chiou-Yng Lee. Multiplexer-based double-exponentiation for normal basis of GF(2:::::::m:::::::)