Journal: Computers & Security

Volume 27, Issue 7-8

233 -- 234Stephen D. Wolthusen. Editorial
235 -- 240Steven Furnell, Valleria Tsaganidi, Andrew D. Phippen. Security beliefs and barriers for novice Internet users
241 -- 253Yacine Rezgui, Adam Marks. Information security awareness in higher education: An exploratory study
254 -- 259H. A. Kruger, W. D. Kearney. Consensus ranking - An ICT security awareness case study
260 -- 284Anthony J. Palmer. Criteria to evaluate Automated Personal Identification Mechanisms
285 -- 297Dimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis. An ontology-based policy for deploying secure SIP-based VoIP services
298 -- 308Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos. Secure log management for privacy assurance in electronic communications
309 -- 322Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez. An optimistic fair exchange protocol based on signature policies
323 -- 334Arati Baliga, Liviu Iftode, Xiaoxin Chen. Automated containment of rootkits attacks
335 -- 354Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. Evaluation of a low-rate DoS attack against application servers
355 -- 359Jose R. C. Piqueira, Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, Vanessa O. Araujo. Dynamic models for computer viruses

Volume 27, Issue 5-6

123 -- 0Stephen D. Wolthusen. From the Editor-in-Chief
124 -- 135Mariana Gerber, Rossouw von Solms. Information security requirements - Interpreting the legal aspects
136 -- 153Dimitris Gritzalis, Yannis Mallios. A SIP-oriented SPIT Management Framework
154 -- 167Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff. SMSSec: An end-to-end protocol for secure SMS
168 -- 175Rachid Beghdad. Critical study of neural networks in detecting intrusions
176 -- 187Wes Masri, Andy Podgurski. Application-based anomaly intrusion detection with dynamic information flow analysis
188 -- 196Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan. Building network attack graph for alert causal correlation
197 -- 215Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timothy E. Levin. Enforcing memory policy specifications in reconfigurable hardware
216 -- 223Hung-Yu Chien. Practical anonymous user authentication scheme with security proof
224 -- 231E. Kritzinger, E. Smith. Information security management: An information security retrieval and awareness model for industry

Volume 27, Issue 3-4

63 -- 0Stephen D. Wolthusen. Editorial
64 -- 70Rolf Oppliger, Ralf Hauser, David A. Basin. SSL/TLS session-aware user authentication revisited
71 -- 83Hein S. Venter, Jan H. P. Eloff, Y.-L. Li. Standardising vulnerability categories
84 -- 100Shi-Jinn Horng, Pingzhi Fan, Yao-Ping Chou, Yen-Cheng Chang, Yi Pan. A feasible intrusion detector for recognizing IIS attacks based on neural networks
101 -- 114Azzam Mourad, Marc-André Laverdière, Mourad Debbabi. An aspect-oriented approach for the systematic security hardening of code
115 -- 121Jia-Lun Tsai. Efficient multi-server authentication scheme based on one-way hash function without verification table

Volume 27, Issue 1-2

1 -- 0Stephen D. Wolthusen. Editorial
3 -- 11Pilsung Kang, Sunghoon Park, Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho. Improvement of keystroke data quality through artificial rhythms and cues
12 -- 15Lein Harn, Jian Ren. Efficient identity-based RSA multisignatures
16 -- 21Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang. Cryptanalysis of simple three-party key exchange protocol
22 -- 29Evan E. Anderson, Joobin Choobineh. Enterprise information security strategies
30 -- 47Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies. A global security architecture for intrusion detection on computer networks
48 -- 62Francesco Palmieri, Ugo Fiore. Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies