Journal: Computers & Security

Volume 26, Issue 7-8

445 -- 451Steven Furnell. An assessment of website password practices
452 -- 458Ik Rae Jeong, Dong-Hoon Lee. Key agreement for key hypergraph
459 -- 467Yang Li, Li Guo. An active learning based TCM-KNN algorithm for supervised network intrusion detection
468 -- 478P. M. Rodwell, Steven Furnell, Paul L. Reynolds. A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
479 -- 484Jianhua Yang, Shou-Hsuan Stephen Huang. Mining TCP/IP packets to detect stepping-stone intrusion
485 -- 487Danny Bradbury. The security challenges inherent in VoIP
488 -- 495Alok Sharma, Arun K. Pujari, Kuldip K. Paliwal. Intrusion detection using text processing techniques with a kernel based similarity measure
496 -- 513Florian P. Buchholz, Eugene H. Spafford. Run-time label propagation for forensic audit data

Volume 26, Issue 6

421 -- 426Stuart P. Goring, Joseph R. Rabaiotti, Antonia J. Jones. Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences
427 -- 433Ming Yu, Xi-Yuan Zhou. An adaptive method for anomaly detection in symmetric network traffic
434 -- 443Steven Furnell. Making security usable: Are things improving?

Volume 26, Issue 5

349 -- 360Hamid Reza Shahriari, Rasool Jalili. Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
361 -- 372Guido Schryen. The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis
373 -- 380Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris. Authentication in a layered security approach for mobile ad hoc networks
381 -- 390Chih-Chien Wang, Sheng-Yi Chen. Using header session messages to anti-spamming
391 -- 400Xosé A. Vila Sobrino, A. Schuster, Adolfo Riera. Security for a Multi-Agent System based on JADE
401 -- 409Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN
410 -- 417Steven Furnell, P. Bryant, Andrew D. Phippen. Assessing the security perceptions of personal Internet users

Volume 26, Issue 4

267 -- 268E. Eugene Schultz. Struggles in the academic side of infosec
276 -- 289Eirik Albrechtsen. A qualitative study of users view on information security
290 -- 299Sushil K. Sharma, Joshua Sefchek. Teaching information systems security courses: A hands-onapproach
300 -- 310Hyoungjoo Lee, Sungzoon Cho. Retraining a keystroke dynamics-based authenticator with impostor patterns
311 -- 318Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura. Masquerade detection by boosting decision stumps using UNIX commands
319 -- 330Ming-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang. Dual-wrapped digital watermarking scheme for image copyright protection
331 -- 337Yuh-Min Tseng. A resource-constrained group key agreement protocol for imbalanced wireless networks
338 -- 347Jun Li, Paul Knickerbocker. Functional similarities between computer worms and biological pathogens

Volume 26, Issue 3

187 -- 0E. Eugene Schultz. Mobile computing: The next Pandora s Box
201 -- 212Iosif-Viorel Onut, Ali A. Ghorbani. SVision: A novel visual network-anomaly identification technique
213 -- 218Tao Li, Zhihong Guan, Xianyong Wu. Modeling and analyzing the spread of active worms based on P2P systems
219 -- 228Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray. Measuring, analyzing and predicting security vulnerabilities in software systems
229 -- 237Gerald V. Post, Albert Kagan. Evaluating information security tradeoffs: Restricting access can interfere with user tasks
238 -- 245Xiaoyan Chen, Bobby N. W. Ma, Cungang Yang. M-CLIQUES: Modified CLIQUES key agreement for secure multicast
246 -- 255Bogdan Ksiezopolski, Zbigniew Kotulski. Adaptable security mechanism for dynamic environments
256 -- 265Albin Zuccato. Holistic security management framework applied in electronic commerce

Volume 26, Issue 2

99 -- 0E. Eugene Schultz. Windows Vista: Microsoft s brave new world
109 -- 119Nathan L. Clarke, Steven Furnell. Advanced user authentication for mobile devices
120 -- 129Konstantina Stoupa, Athena Vakali. Clustering subjects in a credential-based access control framework
130 -- 136Michael Gaiman, Rahul Simha, Bhagirath Narahari. Privacy-preserving programming using sython
137 -- 144Jianhua Yang, Shou-Hsuan Stephen Huang. Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection
145 -- 153Sangkyun Kim, Hong Joo Lee. A study on decision consolidation methods using analytic models for security systems
154 -- 176Oleksiy Mazhelis, Seppo Puuronen. A framework for behavior-based detection of user substitution in a mobile context
177 -- 182Ilan Oshri, Julia Kotlarsky, Corey Hirsch. Information security in networkable Windows-based operating system devices: Challenges and solutions
183 -- 185Christopher J. Novak. Investigative response: After the breach

Volume 26, Issue 1

1 -- 2E. Eugene Schultz. What infosec changes are likely to result from the recent US election?
14 -- 25Chris Roberts. Biometric attack vectors and defences
31 -- 33Danny Bradbury. Decoding digital rights management
35 -- 0Steven Furnell. IFIP workshop - Information security culture
36 -- 43Lynette Drevin, Hennie A. Kruger, Tjaart Steyn. Value-focused assessment of ICT security awareness in an academic environment
44 -- 55Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski. Bridging the gap between general management and technicians - A case study on ICT security in a developing country
56 -- 62A. B. Ruighaver, S. B. Maynard, S. Chang. Organisational security culture: Extending the end-user perspective
63 -- 72Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen. A video game for cyber security training and awareness
73 -- 80Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson. Phishing for user security awareness
81 -- 93Stanley R. M. Oliveira, Osmar R. Zaïane. A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration
94 -- 97Rongxing Lu, Zhenfu Cao. Simple three-party key exchange protocol