Journal: Information Systems Security

Volume 24, Issue 4-6

79 -- 97Shijie Zhou. A Survey on Fast-flux Attacks
98 -- 108Nanta Janpitak, Chanboon Sathitwiriyawong. Automated Compliance Checking Methodology for Non-Log Operations
109 -- 117S. Srisakthi, A. P. Shanthi. Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment
118 -- 126Manas Ranjan Nayak, Baidyanath Tudu, Abhishek Basu, Subir Kumar Sarkar. On the Implementation of a Secured Digital Watermarking Framework
127 -- 132Neamen Negash, Xiangdong Che. An Overview of Modern Botnets
133 -- 145Adebukola Onashoga, Olusola O. Abayomi-Alli, Adesina Simon Sodiya, David A. Ojo. An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System
146 -- 156Primoz Cigoj, Borka Jerman-Blazic. An Authentication and Authorization Solution for a Multiplatform Cloud Environment
157 -- 163Eric J. Smith, Nina A. Kollars. QR Panopticism: User Behavior Triangulation and Barcode-Scanning Applications
164 -- 176Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George C. Oikonomou. A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention
177 -- 184Richard G. Taylor. Potential Problems with Information Security Risk Assessments
185 -- 193Nazmul Islam, Kazi Md. Rokibul Alam, Shaikh Shiam Rahman. Commutative Re-encryption Techniques: Significance and Analysis
194 -- 206Su Zhang, Xinming Ou, Doina Caragea. Predicting Cyber Risks through National Vulnerability Database
207 -- 220Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell. Secure Graphical One Time Password (GOTPass): An Empirical Study

Volume 24, Issue 1-3

1 -- 14Gianluca Lax, Francesco Buccafurri, Gianluca Caminiti. Digital Document Signing: Vulnerabilities and Solutions
15 -- 23Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri. A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia
24 -- 30Paul Rabinovich. Towards Better AAA in Identity Federations
31 -- 38Christopher Cox. Cyber Capabilities and Intent of Terrorist Forces
39 -- 47Huw Read, Iain Sutherland, Konstantinos Xynos, Frode Roarson. Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems
48 -- 56Gregory Early, William Stott III. Preemptive Security Through Information Analytics
57 -- 71Georgios Spanos, Lefteris Angelis. Impact Metrics of Security Vulnerabilities: Analysis and Weighing
72 -- 77Karina Korpela. Improving Cyber Security Awareness and Training Programs with Data Analytics