Journal: Network Security

Volume 2011, Issue 9

5 -- 8Steve Gold. Cracking cellular networks via femtocells
8 -- 11Cath Everett. Printers: the neglected threat
11 -- 16Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian. Protecting personal data from untrusted web-based data services
16 -- 18Alex de Joode. Effective corporate security and cybercrime
18 -- 19Graeme Creasey. Protecting the datacentre

Volume 2011, Issue 8

5 -- 13Steve Mansfield-Devine. Hacktivism: assessing the damage
13 -- 15Avi Turiel. IPv6: new technology, new threats
16 -- 19Colin Tankard. Advanced Persistent threats and how to monitor and deter them

Volume 2011, Issue 7

5 -- 7Steve Gold. Terrorism and Bluetooth
7 -- 9Will Gragido. Beyond zero: analysing threat trends
10 -- 13Tracey Caldwell. Ethical hackers: putting on the white hat
14 -- 19R. Sreeram Sreenivas, R. Anitha. Detecting keyloggers based on traffic analysis with periodic behaviour

Volume 2011, Issue 6

5 -- 8Steve Durbin. Tackling converged threats: building a security-positive environment
8 -- 12Tracey Caldwell. When worlds collide: the security of converged networks
12 -- 14Jeff Hudson. Weaponised malware: how criminals use digital certificates to cripple your organisation
15 -- 17Steve Gold. The rebirth of phreaking
17 -- 19Marc Hocking. Thin client security in the cloud

Volume 2011, Issue 5

5 -- 8Danny Bradbury. Routing around censorship
8 -- 12Aditya K. Sood, Richard J. Enbody. Spying on the browser: dissecting the design of malicious extensions
13 -- 15Steve Gold. Taking down botnets
16 -- 19Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian, Kent E. Seamons. DataVault: secure mobile access and data sharing

Volume 2011, Issue 4

5 -- 9Tracey Caldwell. Smart security
9 -- 12Andy Kemshall. Why mobile two-factor authentication makes sense
12 -- 15Steve Gold. Cracking GSM
15 -- 17Richard Blandford. Information security in the cloud
18 -- 19Steve Jenkins. Learning to love SIEM

Volume 2011, Issue 3

4 -- 10Mark John Taylor, John Haggerty, David Gresty, David J. Lamb. Forensic investigation of cloud computing systems
10 -- 12Russell Sanderson. A secure data protection strategy
12 -- 15Shadi Aljawarneh. A web engineering security methodology for e-learning systems
15 -- 18Steve Gold. IPv6 migration and security
18 -- 19Alexei Lesnykh. Data loss prevention: a matter of discipline

Volume 2011, Issue 2

4 -- 8Steve Durbin. Information security without boundaries
9 -- 12Danny Bradbury. Hacking wifi the easy way
13 -- 15Steve Gold. The future of the firewall
16 -- 17David Ting. Thinking thin: addressing the challenges of client computing
18 -- 19Michael Hamelin. Preparing for a firewall audit

Volume 2011, Issue 12

5 -- 12Steve Mansfield-Devine. DDoS: threats and mitigation
12 -- 14Jérémy D'Hoinne. Could 'wait and see' be the best IPv6 strategy?
15 -- 17Steve Gold. Understanding the hacker psyche
18 -- 19Florian Malecki. A deeper, broader look at network security

Volume 2011, Issue 11

5 -- 9Frank Andrus. Beyond scan and block: an adaptive approach to network access control
9 -- 11Gordon Thomson. APTs: a poorly understood challenge
12 -- 14Klaus Gheri. The benefits of application detection
14 -- 18Steve Gold. Cracking wireless networks
18 -- 20Stuart Facey. Who's in control: a six-step strategy for secure IT

Volume 2011, Issue 10

5 -- 7Steve Gold. Android insecurity
8 -- 12Aditya K. Sood, Richard J. Enbody. Frametrapping the framebusting defence
12 -- 14James Harris. Defending the network several times over
14 -- 18Rohan Nanda, P. Venkata Krishna. Mitigating denial of service attacks in hierarchical wireless sensor networks
18 -- 19Richard Morrell, Akash Chandrashekar. Cloud computing: new challenges and opportunities

Volume 2011, Issue 1

4 -- 10Steve Mansfield-Devine. Anonymous: serious threat or mere annoyance?
10 -- 16Edward Amoroso. Cyber attacks: awareness
16 -- 19Steve Gold. Advanced evasion techniques