Journal: Computers & Security

Volume 25, Issue 8

553 -- 554E. Eugene Schultz. Predicting the future of InfoSec
566 -- 578James Carpinter, Ray Hunt. Tightening the net: A review of current and next generation spam filtering tools
579 -- 588Julie J. C. H. Ryan, Daniel J. Ryan. Expected benefits of information security investments
589 -- 599Jinqian Liang, Xiaohong Guan. A virtual disk environment for providing file system recovery
600 -- 615Glenn Carl, Richard R. Brooks, Suresh Rai. Wavelet based Denial-of-Service detection

Volume 25, Issue 7

475 -- 476E. Eugene Schultz. Issues concerning the distribution of vulnerability information
486 -- 493Hazel Lacohée, Andrew D. Phippen, Steven Furnell. Risk and restitution: Assessing how users establish online trust
494 -- 497Rossouw von Solms, Sebastiaan H. von Solms. Information security governance: Due care
498 -- 506Vinay M. Igure, Sean A. Laughter, Ronald D. Williams. Security issues in SCADA networks
507 -- 521Vassilis Kapsalis, Loukas Hadellis, Dimitris Karelis, Stavros A. Koubias. A dynamic context-aware access control architecture for e-services
522 -- 538Maria Kjaerland. A taxonomy and comparison of computer security incidents from the commercial and government sectors
539 -- 550Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data

Volume 25, Issue 6

393 -- 394E. Eugene Schultz. Microsoft is back in the hot seat
405 -- 407Danny Bradbury. Microsoft s new window on security
408 -- 412Rossouw von Solms, Sebastiaan H. von Solms. Information Security Governance: A model based on the Direct-Control Cycle
413 -- 419Bilge Karabacak, Ibrahim Sogukpinar. A quantitative method for ISO 17799 gap analysis
420 -- 425Kumar Mangipudi, Rajendra S. Katti. A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
426 -- 434Hamida Seba. FTKM: A fault-tolerant key management protocol for multicast communications
435 -- 444Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng. A secure extension of the Kwak-Moon group signcryption scheme
445 -- 451A. A. Abimbola, Jose Munoz, William J. Buchanan. NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
452 -- 458Emrah Tomur, Y. Murat Erten. Application of temporal and spatial role based access control in 802.11 wireless networks
459 -- 468Morteza Amini, Rasool Jalili, Hamid Reza Shahriari. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
469 -- 473Zhi-hong Zuo, Qing-Xin Zhu, Ming-Tian Zhou. Infection, imitation and a hierarchy of computer viruses

Volume 25, Issue 5

315 -- 316E. Eugene Schultz. The changing winds of information security
325 -- 331Stephen Flowerday, A. W. Blundell, Rossouw von Solms. Continuous auditing technologies and models: A discussion
332 -- 337Sanjeev Kumar. PING attack - How bad is it?
338 -- 350Nathanael Paul, David Evans. Comparing Java and .NET security: Lessons learned and missed
351 -- 370Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris. On Incident Handling and Response: A state-of-the-art approach
371 -- 378Mingchao Ma, Steve Woodhead. Authentication delegation for subscription-based remote network services
379 -- 392Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides. A qualitative analysis of software security patterns

Volume 25, Issue 4

237 -- 0E. Eugene Schultz. Representing information security fairly and accurately
247 -- 256Reinhardt A. Botha, Tshepo G. Gaadingwe. Reflecting on 20 SEC conferences
257 -- 264Richard Ford, Mark Bush, Alexander Bulatov. Predation and the cost of replication: New approaches to malware prevention?
265 -- 273Wee Hock Desmond Ng, Haitham S. Cruickshank, Zhili Sun. Scalable balanced batch rekeying for secure group communication
274 -- 288Hassan Artail, Haïdar Safa, Malek Sraj, Iyad Kuwatly, Zaid Al Masri. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
289 -- 296H. A. Kruger, W. D. Kearney. A prototype for assessing information security awareness
297 -- 306Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki. Design of an enhancement for SSL/TLS protocols
307 -- 314Chin-Chen Chang, Jung-San Lee. An anonymous voting mechanism based on the key exchange protocol

Volume 25, Issue 3

155 -- 0E. Eugene Schultz. Special systems: Overlooked sources of security risk?
163 -- 164Danny Bradbury. Modeling network security
165 -- 168Sebastiaan H. von Solms. Information Security - The Fourth Wave
169 -- 183Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon. Real-time analysis of intrusion detection alerts via correlation
184 -- 189Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak. A novel remote user authentication scheme using bilinear pairings
190 -- 200Wenliang Du, Mingdong Shang, Haizhi Xu. A novel approach for computer security education using Minix instructional operating system
201 -- 206Jun Shao, Zhenfu Cao. A traceable threshold signature scheme with multiple signing policies
207 -- 212John Ayoade. Security implications in RFID and authentication processing framework
213 -- 220Ming Li. Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
221 -- 228Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley. An empirical examination of the reverse engineering process for binary files
229 -- 236Guillermo González-Talaván. A simple, configurable SMTP anti-spam filter: Greylists

Volume 25, Issue 2

79 -- 80E. Eugene Schultz. About Unofficial patches
89 -- 90Danny Bradbury. The metamorphosis of malware writers
91 -- 96Vicki Miller Luoma. Computer forensics and electronic discovery: The new management challenge
97 -- 105Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff. Uncovering identities: A study into VPN tunnel fingerprinting
106 -- 113Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang. Provably secure authenticated key exchange protocols for low power computing clients
114 -- 120Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal. A new protocol to counter online dictionary attacks
121 -- 130Nikos Komninos, Dimitris Vergados, Christos Douligeris. Layered security design for mobile ad hoc networks
131 -- 136Raphael Chung-Wei Phan, David Wagner. Security considerations for incremental hash functions based on pair block chaining
137 -- 153Krishna Sampigethaya, Radha Poovendran. A framework and taxonomy for comparison of electronic voting schemes

Volume 25, Issue 1

1 -- 2E. Eugene Schultz. Dilemmas and boundaries of digital rights management
18 -- 26C. M. Roberts. Radio frequency identification (RFID)
27 -- 35Steven Furnell, Adila Jusoh, Dimitris Katsabas. The challenges of understanding and using security: A survey of end-users
36 -- 44Indrakshi Ray, Mahendra Kumar. Towards a location-based mandatory access control model
45 -- 51Christos K. Dimitriadis, Despina Polemi. An identity management protocol for Internet applications over 3G mobile networks
52 -- 54Raphael Chung-Wei Phan. Cryptanalysis of two password-based authentication schemes using smart cards
55 -- 63Neil F. Doherty, Heather Fulford. Aligning the information security policy with the strategic information systems plan
64 -- 71Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho. Steganography in games: A general methodology and its application to the game of Go
72 -- 77Wen-Gong Shieh, Jian-Min Wang. Efficient remote mutual authentication and key agreement