1 | -- | 9 | Mona Dara, Kooroush Manochehri. Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES |
10 | -- | 21 | Mohd Zalisham Jali, Steven M. Furnell, Paul Dowland. Investigating the Viability of Multifactor Graphical Passwords for User Authentication |
22 | -- | 31 | Miguel Morales-Sandoval, Ana Karina Vega Castillo, Arturo Diaz-Perez. A Secure Scheme for Storage, Retrieval, and Sharing of Digital Documents in Cloud Computing Using Attribute-Based Encryption on Mobile Devices |
32 | -- | 44 | Bartosz Inglot, Lu Liu. Enhanced Timeline Analysis for Digital Forensic Investigations |
45 | -- | 0 | Panagiota Polymeropoulou. Digital Archaeology: The Art and Science of Digital Forensics - Upper Saddle River, NJ: Addison-Wesley, 2013, 600p., $79.99. ISBN: 978-0-321-803-90-0 |
46 | -- | 0 | Nicolas Sklavos. Introduction to Computer Networks and Cybersecurity - Boca Raton, FL: CRC Press/Taylor & Francis Group, 2013, 1236p., $130.00. ISBN 1466572132 |
47 | -- | 48 | Nicolas Sklavos. Mike Meyers' CompTIA Security + Certification Passport (Exam SY0-301) - 3rd ed. New York: McGraw-Hill Osborne Media, 2011, 480p., $30.00. ISBN: 13: 978-0071770385 |
49 | -- | 50 | Nicolas Sklavos. Cryptography and Network Security: Principles and Practice - 6th ed. Upper Saddle River, NJ: Prentice Hall, 2013, 752p., $142.40. ISBN: 13: 978-0133354690 |
51 | -- | 0 | Nicolas Sklavos. Web Application Security, A Beginner's Guide - McGraw-Hill Osborne Media, Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 352p., $40.00. ISBN: 10: 0071776168, ISBN: 13: 978-0071776165 |
52 | -- | 53 | Nicolas Sklavos. Securing the Clicks: Network Security in the Age of Social Media - McGraw-Hill Osborne Media, 2011, 368p., $40.00. ISBN: 10: 0071769056, ISBN: 13: 978-0071769051 |
54 | -- | 0 | Nicolas Sklavos. Security Metrics, A Beginner's Guide - McGraw-Hill Osborne Media, A Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 432p., $40.00. ISBN: 10: 0071744002, ISBN: 13: 978-0071744003 |
55 | -- | 56 | Nicolas Sklavos. Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects |