Journal: Computers & Security

Volume 30, Issue 8

553 -- 554Eugene H. Spafford. Editorial for 30/8
555 -- 570Da Zhang, Chai Kiat Yeo. Distributed Court System for intrusion detection in mobile ad hoc networks
571 -- 579Trent Jaeger, Paul C. van Oorschot, Glenn Wurster. Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
580 -- 596Argyris Arnellos, Dimitrios Lekkas, Dimitrios Zissis, Thomas Spyrou, John Darzentas. Fair digital signing: The structural reliability of signed documents
597 -- 612Nayantara Mallesh, Matthew Wright. An analysis of the statistical disclosure attack and receiver-bound cover
613 -- 624Hugo Gascon, Agustín Orfila, Jorge Blasco Alís. Analysis of update delays in signature-based network intrusion detection systems
625 -- 642Constantinos Kolias, Georgios Kambourakis, M. Maragoudakis. Swarm intelligence in intrusion detection: A survey
643 -- 678Eleftheria Makri, Elisavet Konstantinou. Constant round group key agreement protocols: A comparative study
679 -- 691Nikos Mavrogiannopoulos, Nessim Kisserli, Bart Preneel. A taxonomy of self-modifying code for obfuscation
692 -- 704Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. Combining sketches and wavelet analysis for multi time-scale network anomaly detection
705 -- 718Giampaolo Bella, Rosario Giustolisi, Salvatore Riccobene. Enforcing privacy in e-commerce by balancing anonymity and trust
719 -- 731Kim-Kwang Raymond Choo. The cyber threat landscape: Challenges and future research directions
732 -- 747Lin Huang, Mark Stamp. Masquerade detection using profile hidden Markov models
748 -- 769Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu. Roles in information security - A survey and classification of the research area
770 -- 779James S. Okolica, Gilbert L. Peterson. Windows driver memory analysis: A reverse engineering methodology
780 -- 790GuangXu Zhou, Murat Demirer, Coskun Bayrak, Licheng Wang. Enable delegation for RBAC with Secure Authorization Certificate
791 -- 802Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani. Estimating botnet virulence within mathematical models of botnet propagation dynamics
803 -- 814Nigel J. Martin, John L. Rice. Cybercrime: Understanding and addressing the concerns of stakeholders
815 -- 829Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. 2: Energy efficient voice over IP privacy
830 -- 839Jung-San Lee, Ming-Huang Hsieh. An interactive mobile SMS confirmation method using secret sharing technique

Volume 30, Issue 6-7

351 -- 352Eugene H. Spafford. Editorial
353 -- 375Jonathan J. Davis, Andrew J. Clark. Data preprocessing for anomaly based network intrusion detection: A review
376 -- 396Slim Rekhis, Noureddine Boudriga. Logic-based approach for digital forensic investigation in communication Networks
397 -- 409Ignacio J. Martinez-Moyano, Stephen H. Conrad, David F. Andersen. Modeling behavioral considerations related to information security
410 -- 426Klaus Julisch, Christophe Suter, Thomas Woitalla, Olaf Zimmermann. Compliance by design - Bridging the chasm between auditors and IT architects
427 -- 445Romain Giot, Mohamad El-Abed, Baptiste Hemery, Christophe Rosenberger. Unconstrained keystroke dynamics authentication with shared secret
446 -- 463Fernando Pereñiguez-Garcia, Rafael Marín López, Georgios Kambourakis, Stefanos Gritzalis, Antonio F. Gómez-Skarmeta. PrivaKERB: A user privacy framework for Kerberos
464 -- 485Arne Tauber. A survey of certified mail systems provided on the Internet
486 -- 497Clay Posey, Rebecca J. Bennett, Tom L. Roberts. Understanding the mindset of the abusive insider: An examination of insiders causal reasoning following internal security changes
498 -- 513Amit Sachan, Sabu Emmanuel. Rights violation detection in multi-level digital rights management system
514 -- 524Ding Yuxin, Yuan Xuebing, Zhou Di, Dong Li, An Zhanchao. Feature representation and selection in malicious code detection methods based on static system calls
525 -- 537Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi. Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks
538 -- 546Jianhua Yang, David Woolbright. Correlating TCP/IP Packet contexts to detect stepping-stone intrusion

Volume 30, Issue 5

295 -- 296Yang Xiang, Jiankun Hu, Wanlei Zhou. Editorial: Advances in network and system security
297 -- 310Juan E. Tapiador, John A. Clark. Masquerade mimicry attack detection: A randomised approach
311 -- 319Peng Zhang, Jiankun Hu, Cai Li, Mohammed Bennamoun, Vijayakumar Bhagavatula. A pitfall in fingerprint bio-cryptographic key generation
320 -- 331Guojun Wang, Qin Liu, Jie Wu, Minyi Guo. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
332 -- 345Xiaoxun Sun, Hua Wang, Jiuyong Li, Yanchun Zhang. Injecting purpose and trust into data anonymisation

Volume 30, Issue 4

171 -- 0Eugene H. Spafford. Editorial
172 -- 177Xiongfeng Ma, Chi-Hang Fred Fung, Jean-Christian Boileau, H. F. Chau. Universally composable and customizable post-processing for practical quantum key distribution
178 -- 193Travis D. Breaux, David L. Baumer. Legally reasonable security requirements: A 10-year FTC retrospective
194 -- 207Hugues Chabot, Raphael Khoury, Nadia Tawbi. Extending the enforcement power of truncation monitors using static analysis
208 -- 220Nancie Gunson, Diarmid Marshall, Hazel Morton, Mervyn A. Jack. User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
221 -- 241Davide Ariu, Roberto Tronci, Giorgio Giacinto. HMMPayl: An intrusion detection system based on Hidden Markov Models
242 -- 256Sebastian Möller, Noam Ben-Asher, Klaus-Peter Engelbrecht, Roman Englert, Joachim Meyer. Modeling the behavior of users who are confronted with security mechanisms
257 -- 272Stylianos Basagiannis, Sophia G. Petridou, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros. Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach
273 -- 287Dong-Her Shih, David C. Yen, Chih-Hung Cheng, Ming-Hung Shih. A secure multi-item e-auction mechanism with bid privacy

Volume 30, Issue 2-3

89 -- 90Dimitris Gritzaliz, James Joshi. Editorial
91 -- 107Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo. Fine-grained integration of access control policies
108 -- 115Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham. Semantic web-based social network access control
116 -- 127Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang. Patient-centric authorization framework for electronic healthcare services
128 -- 147Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri. Security analysis of GTRBAC and its variants using model checking
148 -- 164Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan. Symbolic reachability analysis for parameterized administrative role-based access control

Volume 30, Issue 1

1 -- 0Eugene H. Spafford. Editorial
2 -- 3Eugene H. Spafford. Security, technology, publishing, and ethics (part II)
4 -- 12Zac Sadan, David G. Schwartz. WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure
13 -- 27Qijun Gu, Christopher Ferguson, Rizwan Noorani. A study of self-propagating mal-packets in sensor networks: Attacks and defenses
28 -- 34Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang. An efficient and non-interactive hierarchical key agreement protocol
35 -- 49Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza. Designing a cluster-based covert channel to evade disk investigation and forensics
50 -- 62Sung-Whan Woo, HyunChul Joh, Omar H. Alhazmi, Yashwant K. Malaiya. Modeling vulnerability discovery process in Apache and IIS HTTP servers
63 -- 80Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks