Journal: Computers & Security

Volume 28, Issue 8

729 -- 730Dimitris Gritzalis, Tom Karygiannis. Editorial
731 -- 742Amir Herzberg. DNS-based email sender authentication mechanisms: A critical review
743 -- 753Ram Dantu, Sonia Fahmy, Henning Schulzrinne, João W. Cangussu. Issues and challenges in securing VoIP
754 -- 771Srdjan Pudar, G. Manimaran, Chen-Ching Liu. PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
772 -- 784Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Joan García-Haro. Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths
785 -- 794Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li. A study of on/off timing channel based on packet delay distribution
795 -- 802Junsup Lee, Sung Deok Cha, Dongkun Lee, Hyungkyu Lee. Classification of web robots: An empirical study based on over one billion requests
803 -- 815Yu-Lun Huang, P. H. Lu, J. Doug Tygar, A. D. Joseph. OSNP: Secure wireless authentication protocol using one-time key
816 -- 826Hyeun-Suk Rhee, Cheong-Tag Kim, Young U. Ryu. Self-efficacy in information security: Its influence on end users' information security practice behavior
827 -- 842Yong Tang, Bin Xiao, Xicheng Lu. Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
843 -- 856Jorge Fontenla González, Manuel Caeiro Rodríguez, Martín Llamas Nistal, Luis E. Anido-Rifón. Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems

Volume 28, Issue 7

491 -- 492Dimitris Gritzalis, Steven Furnell. Editorial
493 -- 508Kenneth J. Knapp, R. Franklin Morris Jr., Thomas E. Marshall, Terry Anthony Byrd. Information security policy: An organizational-level process model
509 -- 520Sara Kraemer, Pascale Carayon, John Clem. Human and organizational factors in computer and information security: Pathways to vulnerabilities
521 -- 535Howard Chivers, John A. Clark, Pau-Chen Cheng. Risk profiles and distributed risk assessment
536 -- 544Keshnee Padayachee, Jan H. P. Eloff. Adapting usage control as a deterrent to address the inadequacies of access controls
545 -- 556Félix Gómez Mármol, Gregorio Martínez Pérez. Security threats scenarios in trust and reputation models for distributed systems
557 -- 565Hongwei Lu, Bailing Liu. DFANS: A highly efficient strategy for automated trust negotiation
566 -- 577Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer. What the heck is this application doing? - A security-by-contract architecture for pervasive services
578 -- 591Dimitris Geneiatakis, Nikos Vrakas, Costas Lambrinoudakis. Utilizing bloom filters for detecting flooding attacks against SIP based services
592 -- 604Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna. Client-side cross-site scripting protection
605 -- 614Zonghua Zhang, Pin-Han Ho, Liwen He. Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
615 -- 627Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. Confidence in smart token proximity: Relay attacks revisited
628 -- 636Fangwei Wang, Yunkai Zhang, Jianfeng Ma. Defending passive worms in unstructured P2P networks based on healthy file dissemination
637 -- 647Scott E. Coull, Boleslaw K. Szymanski. On the development of an internetwork-centric defense for scanning worms
648 -- 659Suleyman Kondakci. A concise cost analysis of Internet malware
660 -- 669Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno. Providing secure execution environments with a last line of defense against Trojan circuit attacks
670 -- 682Özdemir Çetin, Ahmet Turan Özcerit. A new steganography algorithm based on color histograms for data embedding into raw video streams
683 -- 697S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system
698 -- 709Ibrahim Kamel. A schema for protecting the integrity of databases
710 -- 722Refik Samet. Design and implementation of highly reliable dual-computer systems

Volume 28, Issue 6

325 -- 326Dimitris Gritzalis, Javier Lopez. Editorial
327 -- 340Siddharth Bhatt, Radu Sion, Bogdan Carbunar. A personal mobile DRM manager for smartphones
341 -- 358Azzam Mourad, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi. New aspect-oriented constructs for security hardening concerns
359 -- 380Djamel Fawzi Hadj Sadok, Eduardo Souto, Eduardo Feitosa, Judith Kelner, Lars Westberg. RIP - A robust IP access architecture
381 -- 394Michael Edward Edge, Pedro R. Falcone Sampaio. A survey of signature based methods for financial fraud detection
395 -- 409Ibrahim Kamel, Qutaiba Albluwi. A robust software watermarking for copyright protection
410 -- 420Mohammad Mannan, Paul C. van Oorschot. Reducing threats from flawed security APIs: The banking PIN case
421 -- 432Joon Son, Jim Alves-Foss. A formal framework for real-time information flow analysis
433 -- 449Francesco Palmieri, Ugo Fiore. Providing true end-to-end security in converged voice over IP infrastructures
450 -- 465Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou. Probabilistic model checking for the quantification of DoS security threats
466 -- 475Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu, Chen Young. Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
476 -- 490Eirik Albrechtsen, Jan Hovden. The information security digital divide between information security managers and users

Volume 28, Issue 5

247 -- 0Dimitris Gritzalis, Sokratis K. Katsikas. Editorial
248 -- 259John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang. Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements
260 -- 275Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu. Towards secure dynamic collaborations with group-based RBAC model
276 -- 288Hyunsang Choi, Heejo Lee, Hyogon Kim. Fast detection and visualization of network attacks on parallel coordinates
289 -- 300Mildrey Carbonell, José María Sierra, Javier Lopez. Secure multiparty payment with an intermediary entity
301 -- 309Ming-Yang Su, Gwo-Jong Yu, Chun-Yuen Lin. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
310 -- 324Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider. Specifying authentication using signal events in CSP

Volume 28, Issue 3-4

105 -- 120Albert Levi, Can Berk Güder. Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach
121 -- 129Dimitris Mitropoulos, Diomidis Spinellis. SDriver: Location-specific signatures prevent SQL injection attacks
130 -- 137Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke. From desktop to mobile: Examining the security experience
138 -- 143Jen-Ho Yang, Chin-Chen Chang. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
144 -- 152Kuo-Fong Kao, I-En Liao, Yueh-Chia Li. Detecting rogue access points using client-side bottleneck bandwidth analysis
153 -- 173Reza Sadoddin, Ali A. Ghorbani. An incremental frequent structure mining framework for real-time alert correlation
174 -- 188Alessandro Basso, Stefano Sicco. Preventing massive automated access to web resources
189 -- 198M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff. Information security: The moving target
199 -- 214Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah. Reliable and fully distributed trust model for mobile ad hoc networks
215 -- 228Divakaran Liginlal, Inkook Sim, Lara Khansa. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
229 -- 241P. P. Deepthi, P. S. Sathidevi. Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions

Volume 28, Issue 1-2

1 -- 0Stephen D. Wolthusen. Editorial
2 -- 7Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff. Building access control models with attribute exploration
8 -- 17Travis D. Breaux, Annie I. Antón, Eugene H. Spafford. A distributed requirements management framework for legal compliance and accountability
18 -- 28Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo, Gabriel Maciá-Fernández, E. Vázquez. Anomaly-based network intrusion detection: Techniques, systems and challenges
29 -- 39Xiaozhuo Gu, Jianzu Yang, Julong Lan, Zhenhuan Cao. Huffman-based join-exit-tree scheme for contributory key management
40 -- 46Javad Akbari Torkestani, Mohammad Reza Meybodi. RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems
47 -- 62Catherine S. Weir, Gary Douglas, Martin Carruthers, Mervyn A. Jack. User perceptions of security, convenience and usability for ebanking authentication tokens
63 -- 71Amir Herzberg. Why Johnny can t surf (safely)? Attacks and defenses for web users
72 -- 76Hongxin Zhang, Yuewang Huang, Jianxin Wang, Yinghua Lu, Jinling Zhang. Recognition of electro-magnetic leakage information from computer radiation with SVM
77 -- 84K. Vimal Kumar. Securing communication using function extraction technology for malicious code behavior analysis
85 -- 93Seongseob Hwang, Sungzoon Cho, Sunghoon Park. Keystroke dynamics-based authentication for mobile devices
94 -- 99Jasim A. Ghaeb, J. Chebil. An oblique-matrix technique for data integrity assurance
100 -- 104Song Lin, Biao Wang, Zhoujun Li. Digital multisignature on the generalized conic curve over Z::n::