Journal: Information Systems Security

Volume 21, Issue 6

297 -- 305Stefan G. Weber. A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes
306 -- 316Osama Hayatle, Amr Youssef, Hadi Otrok. Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies
317 -- 327Vinay Kumar, Abhishek Bansal, Sunil Kumar Muttoo. Hiding Information in Vector Layer While Extracting Layers from Raster Data
328 -- 345Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas. How Effective Is Your Security Awareness Program? An Evaluation Methodology
346 -- 352Chandrapal Chahar, Vishal Singh Chauhan, Manik Lal Das. Code Analysis for Software and System Security Using Open Source Tools
353 -- 354Abubakr Magzoub. Privacy and Big Data, by Craig, T., and Ludloff, M. E.Sebastopol, CA: O'Reilly Media, 2011, 91p. $14.99. ISBN: 978-1-449-30500-0
355 -- 356Larry Marks. Blackjacking: Security Threats to Blackberry Devices, PDAs and Cell Phones in the Enterprise, by Hoffman, Daniel V.New York: Wiley, 2007, 292p., $39.99.ISBN 978-0-470-12754-4

Volume 21, Issue 5

231 -- 242Ismail San, Nuray At. Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs
243 -- 255T. N. Shankar, G. Sahoo, S. Niranjan. Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication
256 -- 268Lo'ai Ali Tawalbeh, Omar Banimelhem, Mohammed Al-Batati. A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process
269 -- 279Henk-Jan van der Molen. Forecasting Malware Conditions: Worsening Conditions, Some Bright Spots
280 -- 284Georgios Mamalakis, Chariton Karamitas. A Unified User Management System
285 -- 295Osama S. Faragallah. Quadruple Difference Expansion-Based Reversible Data Hiding Method for Digital Images

Volume 21, Issue 4

169 -- 182Syed Akram, Mohammed Misbahuddin, G. Varaprasad. A Usable and Secure Two-Factor Authentication Scheme
183 -- 192Sherali Zeadally, Byunggu Yu, Dong Hyun Jeong, Lily Rui Liang. Detecting Insider Threats: Solutions and Trends
193 -- 205Ibrahim F. Elashry, Osama S. Faragallah, Alaa M. Abbas, S. El-Rabaie, Fathi E. Abd El-Samie. A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode
206 -- 215Gerardo Canfora, Corrado Aaron Visaggio. Managing Trust in Social Networks
216 -- 229Timothy Godlove. Examination of the Factors that Influence Teleworkers' Willingness to Comply with Information Security Guidelines

Volume 21, Issue 3

115 -- 126Kenneth Earl Gumm Jr.. Can Social Network Analysis be Effective at Improving the Intelligence Community While Ensuring Civil Rights?
127 -- 136Douglas Warfield. Critical Infrastructures: IT Security and Threats from Private Sector Ownership
137 -- 149O. T. Arogundade, A. T. Akinwale, Z. Jin, X. G. Yang. Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse
150 -- 158S. A. Arunmozhi, Y. Venkataramani. Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network
159 -- 168David Bennett. The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations

Volume 21, Issue 2

65 -- 70P. Mohan Kumar, K. L. Shunmuganathan. Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate
71 -- 78Kevin T. Smith. Mitigating Risks Associated with Transitive Trust in Service-Based Identity Propagation
79 -- 87Kakali Chatterjee, Asok De, Daya Gupta. Timestamp-Based Digital Envelope for Secure Communication Using HECC
88 -- 101Roli Bansal, Priti Sehgal, Punam Bedi. Securing Fingerprint Images Using PSO-Based Wavelet Domain Watermarking
102 -- 114Jian-hua, Sanjay Bapna. How Can We Deter Cyber Terrorism?

Volume 21, Issue 1

1 -- 11Mohammad Fraiwan, Rami Al-Salman, Natheer Khasawneh, Stefan Conrad. Analysis and Identification of Malicious JavaScript Code
12 -- 27Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos. A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments
28 -- 35Addepalli V. N. Krishna. An Improvised ECC Mechanism with Probabilistic Approach
36 -- 46Uloli Thiruvaazhi, M. Edington Alex. A Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack
47 -- 54Jason S. Burkett. Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®
55 -- 63Mohamed Ibrahiem Amer, Tarek S. Sobh, Gouda Ismail Mohamed. Using Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS