Journal: Inf. Sec. Techn. Report

Volume 8, Issue 4

5 -- 0Chez Ciechanowicz. Introduction
6 -- 13Glenn Gunara-Chen. The art of intrusion testing
14 -- 25Andrew Blyth. An XML-based architecture to perform data integration and data unification in vulnerability assessments
26 -- 33Gerhard Eschelbeck, Michael Krieger. Eliminating noise from intrusion detection systems
34 -- 44Andy Gray. An historical perspective of software vulnerability management
45 -- 55Evangelos Morakis, Stilianos Vidalis, Andrew Blyth. Measuring vulnerabilities and their exploitation cycle
56 -- 64Neil Barrett. Penetration testing and social engineering: Hacking the weakest link
65 -- 77Paul Midian. How to ensure an effective penetration test
78 -- 84Stein Mollerhaug. Useful vulnerability assessment

Volume 8, Issue 3

5 -- 0Fred Piper, Geraint Price, Kenny Paterson. Introduction
23 -- 35Dick Emery, Stephen Upton, Richard Trevorah. tScheme - voluntary approval for certificate authority services
36 -- 44Semia Jaweed. Could there ever be a unitary digital certificate?
57 -- 72Kenneth G. Paterson, Geraint Price. A comparison between traditional public key infrastructures and identity-based cryptography
73 -- 88Chris R. Dalton. The NHS as a proving ground for cryptosystems

Volume 8, Issue 2

5 -- 0Chez Ciechanowicz. Introduction
6 -- 17. Forensic analysis on a Lotus Notes server
18 -- 31. Addressing the data problem
32 -- 36. Computer forensics: past, present and future
37 -- 41. Some stepping stones in computer forensics
42 -- 54. A comprehensive approach to digital incident investigation
55 -- 64. Management strategies for implementing forensic security measures

Volume 8, Issue 1

5 -- 0Chez Ciechanowicz. Introduction
6 -- 16Keith Mayes, Konstantinos Markantonakis. Are we smart about security?
17 -- 29Konstantinos Markantonakis, Keith Mayes. An overview of the GlobalPlatform smart card specification
30 -- 44Daniel Page. Defending against cache-based side-channel attacks
45 -- 54Paul Aebi, Rudolf Oswald. Secure SIM lifecycle management
55 -- 66Pierre Girard, Jean-Luc Giraud. Software attacks on smart cards
67 -- 84Wolfgang Rankl. Overview about attacks on smart cards