728 | -- | 731 | David G. Rosado, Luís Enrique Sanchez, Eduardo Fernández-Medina, Jan Jürjens. Security in Information Systems: New Challenges and Opportunities |
732 | -- | 749 | Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt. Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations |
750 | -- | 774 | Ickin Vural, Hein S. Venter. Combating Mobile Spam through Botnet Detection using Artificial Immune Systems |
775 | -- | 797 | Pattama Charuenporn, Sarun Intakosum. Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services |
798 | -- | 815 | Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina. A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment |
816 | -- | 844 | Raimundas Matulevicius, Haralambos Mouratidis, Nicolas Mayer, Eric Dubois 0001, Patrick Heymans. Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management |
845 | -- | 856 | Carla-Lee Botha, Elmarie Kritzinger, Marianne Loock. A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks |
857 | -- | 873 | Jezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil. Countermeasures to Prevent Misbehaviour in VANETs |
874 | -- | 898 | Said Gharout, Abdelmadjid Bouabdallah, Yacine Challal, Mohammed Achemlal. Adaptive Group Key Management Protocol for Wireless Communications |