Journal: Network Security

Volume 2011, Issue 7

5 -- 7Steve Gold. Terrorism and Bluetooth
7 -- 9Will Gragido. Beyond zero: analysing threat trends
10 -- 13Tracey Caldwell. Ethical hackers: putting on the white hat
14 -- 19R. Sreeram Sreenivas, R. Anitha. Detecting keyloggers based on traffic analysis with periodic behaviour