Journal: Computers & Security

Volume 31, Issue 8

857 -- 858Gene Spafford. Editorial
859 -- 869Ying Qian, Yulin Fang, Jose J. Gonzalez. Managing information security risks during new technology adoption
870 -- 885Jie Shi, Yingjiu Li, Robert H. Deng. A secure and efficient discovery service system in EPCglobal network
886 -- 896Yu-Lun Huang, Hsin-Yi Tsai. A framework for quantitative evaluation of parallel control-flow obfuscation
897 -- 911Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn, Irini Kokkinou. Access control for online social networks third party applications
912 -- 924Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen. Optimal mining on security labels for decentralized information flow control
925 -- 939Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Arnau Vives-Guasch, Jordi Castellà-Roca. A survey of electronic ticketing applied to transport
940 -- 955Theis Solberg Hjorth, Rune Torbensen. Trusted Domain: A security platform for home automation
956 -- 966Cristina Alcaraz, Javier Lopez, Rodrigo Roman, Hsiao-Hwa Chen. Selecting key management schemes for WSN applications
967 -- 982Slim Rekhis, Noureddine Boudriga. A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks
983 -- 988Steven Furnell, Nathan L. Clarke. Power to the people? The evolving recognition of human aspects of security
989 -- 1010Roger Jardí-Cedó, Jordi Pujol Ahulló, Jordi Castellà-Roca, Alexandre Viejo. Study on poll-site voting and verification systems
1011 -- 1012Jennifer L. Bayuk. Wishful thinking
1013 -- 0Katina Michael. Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges

Volume 31, Issue 7

806 -- 815Scott E. Coull, Andrew M. White 0002, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter. Understanding domain registration abuses
816 -- 826Omar Hasan, Lionel Brunie, Elisa Bertino. Preserving privacy of feedback providers in decentralized reputation systems
827 -- 843Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld. On-the-fly inlining of dynamic security monitors
844 -- 855Alessandro Colantonio, Roberto Di Pietro, Nino Vincenzo Verde. A business-driven decomposition methodology for role mining

Volume 31, Issue 6

739 -- 740Eugene H. Spafford. Editorial
741 -- 749Anmin Fu, Yuqing Zhang, ZhenChao Zhu, Qi Jing, Jingyu Feng. An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
750 -- 770Lara Khansa, Deborah F. Cook, Tabitha L. James, Olga Bruyaka. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
771 -- 781Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Pompeo Faruolo, Fabio Petagna, Umberto Ferraro Petrillo. Engineering a secure mobile messaging framework
782 -- 790Stavros N. Shiaeles, Vasilios Katos, Alexandros S. Karakos, Basil K. Papadopoulos. Real time DDoS detection using fuzzy estimators
791 -- 798WenBin Hsieh, Jenq-Shiou Leu. Exploiting hash functions to intensify the remote user authentication scheme
799 -- 0Katina Michael. Hacking: The Next Generation
800 -- 0Tim Wedge. The Basics of Digital Forensics
801 -- 0Bill Tsoumas, Dimitris Gritzalis. Inside Cyber Warfare: Mapping the Cyber Underworld
802 -- 803Alexios Mylonas, Dimitris Gritzalis. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Volume 31, Issue 5

641 -- 642Eugene H. Spafford. Editorial
643 -- 652Atif Ahmad, Justin Hadgkiss, Anthonie B. Ruighaver. Incident response teams - Challenges in supporting the organisational security function
653 -- 672Sergio Martínez, David Sánchez 0001, Aïda Valls. Semantic adaptive microaggregation of categorical microdata
673 -- 680Keshnee Padayachee. Taxonomy of compliant information security behavior
681 -- 703Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner. Securing distributed systems using patterns: A survey
704 -- 716Diqun Yan, Rangding Wang, Xianmin Yu, Jie Zhu. Steganography for MP3 audio by exploiting the rule of window switching
717 -- 726Yasin Uzun, Kemal Bicakci. A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
727 -- 735Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis
736 -- 737Jennifer L. Bayuk. A programmer's perspective
738 -- 0Manuel Leithner, Edgar R. Weippl. Low Tech Hacking

Volume 31, Issue 4

377 -- 390Ying Zeng, Fenlin Liu, Xiangyang Luo, Shiguo Lian. Abstract interpretation-based semantic framework for software birthmark
391 -- 401Muhammed Naeem Ahmed Khan. Performance analysis of Bayesian networks and neural networks in classification of file system activities
402 -- 417Zhijun Wu, Haitao Zhang, Minghua Wang, Bao-song Pei. MSABMS-based approach of detecting LDoS attack
418 -- 436A. Nicholson, S. Webber, S. Dyer, T. Patel, H. Janicke. SCADA security in the light of Cyber-Warfare
437 -- 446Ahmed I. Sallam, El-Sayed El-Rabaie, Osama S. Faragallah. Encryption-based multilevel model for DBMS
447 -- 464Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. Dynamic risk-based decision methods for access control systems
465 -- 483San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
484 -- 496Hyoungshick Kim, Jun Ho Huh. PIN selection policies: Are they really effective?
497 -- 523Youna Jung, James B. D. Joshi. CRiBAC: Community-centric role interaction based access control model
524 -- 539Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre. FT-FW: A cluster-based fault-tolerant architecture for stateful firewalls
540 -- 556Antonios Gouglidis, Ioannis Mavridis. domRBAC: An access control model for modern collaborative systems
557 -- 568Jorge Blasco Alís, Julio César Hernández Castro, Juan E. Tapiador, Arturo Ribagorda. Bypassing information leakage protection with trusted applications
569 -- 596Bogdan Ksiezopolski. QoP-ML: Quality of protection modelling language for cryptographic protocols
597 -- 611Shari Lawrence Pfleeger, Deanna D. Caputo. Leveraging behavioral science to mitigate cyber security risk
612 -- 628Matthew Van Gundy, Hao Chen. Noncespaces: Using randomization to defeat cross-site scripting attacks
629 -- 0Aleksandar Hudic, Edgar Weippl. Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
630 -- 632Nora Cuppens-Boulahia. Penetration Tester's Open Source Toolkit
633 -- 0Katina Michael. Securing the Cloud: Cloud Computer Security Techniques and Tactics
634 -- 635Katina Michael. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
636 -- 0Edgar Weippl, Manuel Leithner. Enterprise Security for the Executive
637 -- 0William J. Caelli. Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners
638 -- 0Manuel Leithner, Edgar R. Weippl. Thor's Microsoft Security Bible
639 -- 0Manuel Leithner, Edgar Weippl. XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Volume 31, Issue 3

273 -- 285Maurizio Molina, Ignasi Paredes-Oliva, Wayne Routly, Pere Barlet-Ros. Operational experiences with anomaly detection in backbone networks
286 -- 298Chalee Vorakulpipat, Vasaka Visoottiviseth, Siwaruk Siwamogsatham. Polite sender: A resource-saving spam email countermeasure based on sender responsibilities and recipient justifications
299 -- 314Jenny Abramov, Omer Anson, Michal Dahan, Peretz Shoval, Arnon Sturm. A methodology for integrating access control policies within database development
315 -- 326Louay Karadsheh. Applying security policies and service level agreement to IaaS service model to enhance security and transition
327 -- 343Ricardo Lent. Evaluating a migration-based response to DoS attacks in a system of distributed auctions
344 -- 356Theodoor Scholte, Davide Balzarotti, Engin Kirda. Have things changed now? An empirical study on input validation vulnerabilities in web applications
357 -- 374Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani. Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Volume 31, Issue 2

149 -- 150Eugene H. Spafford. Editorial
151 -- 163Hisham Al-Assam, Sabah Jassim. Security evaluation of biometric keys
164 -- 175Hannes Holm. Performance of automated network vulnerability scanning at remediating security issues
176 -- 191Jinpeng Wei, Calton Pu. Toward a general defense against kernel queue hooking attacks
192 -- 205Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang. Multiple-File Remote Data Checking for cloud storage
206 -- 220Divakaran Liginlal, Inkook Sim, Lara Khansa, Paul Fearn. HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory
221 -- 232Hyeun-Suk Rhee, Young U. Ryu, Cheong-Tag Kim. Unrealistic optimism on information security management
233 -- 248Yu-Chi Chung, Ming-Chuan Wu, Yih-Chang Chen, Wen-Kui Chang. A Hot Query Bank approach to improve detection performance against SQL injection attacks
249 -- 250Katina Michael. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
251 -- 0Jennifer L. Bayuk. Cyber Attacks
252 -- 0Manuel Leithner, Edgar Weippl. Coding for Penetration Testers
253 -- 270Richard Macfarlane, William J. Buchanan, Elias Ekonomou, Omair Uthmani, Lu Fan, Owen Lo. Formal security policy implementations in network firewalls

Volume 31, Issue 1

1 -- 2Eugene H. Spafford. Editorial
3 -- 0Manuel Leithner, Edgar Weippl. Android forensics
4 -- 25Antonio Maña, Hristo Koshutanski, Ernesto J. Pérez. A trust negotiation based security framework for service provisioning in load-balancing clusters
26 -- 32M. Oguzhan Külekci. On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression
33 -- 39Gaobo Yang, Ning Chen, Qin Jiang. A robust hashing algorithm based on SURF for video copy detection
40 -- 58Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. A new robust adjustable logo watermarking scheme
59 -- 69Xingwen Zhao, Fangguo Zhang. Tracing and revoking scheme for dynamic privileges against pirate rebroadcast
70 -- 82Sheng Mou, Zhiwen Zhao, Sisi Jiang, Zushun Wu, Jiaojiao Zhu. Feature extraction and classification algorithm for detecting complex covert timing channel
83 -- 95Princely Ifinedo. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
96 -- 108Luis Rodero Merino, Luis Miguel Vaquero, Eddy Caron, Adrian Muresan, Frédéric Desprez. Building safe PaaS clouds: A survey on security in multitenant software platforms
109 -- 121Deian Stefan, Xiaokui Shu, Danfeng (Daphne) Yao. Robustness of keystroke-dynamics based biometrics against synthetic forgeries
122 -- 136Timothy H. Lacey, Robert F. Mills, Barry E. Mullins, Richard A. Raines, Mark E. Oxley, Steven K. Rogers. RIPsec - Using reputation-based multilayer security to protect MANETs
137 -- 147Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers. Malware target recognition via static heuristics