researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Network Security
Home
Index
Info
Volume
Volume
2011
, Issue
9
5
--
8
Steve Gold
.
Cracking cellular networks via femtocells
8
--
11
Cath Everett
.
Printers: the neglected threat
11
--
16
Ravi Chandra Jammalamadaka
,
Sharad Mehrotra
,
Nalini Venkatasubramanian
.
Protecting personal data from untrusted web-based data services
16
--
18
Alex de Joode
.
Effective corporate security and cybercrime
18
--
19
Graeme Creasey
.
Protecting the datacentre
Volume
2011
, Issue
8
5
--
13
Steve Mansfield-Devine
.
Hacktivism: assessing the damage
13
--
15
Avi Turiel
.
IPv6: new technology, new threats
16
--
19
Colin Tankard
.
Advanced Persistent threats and how to monitor and deter them
Volume
2011
, Issue
7
5
--
7
Steve Gold
.
Terrorism and Bluetooth
7
--
9
Will Gragido
.
Beyond zero: analysing threat trends
10
--
13
Tracey Caldwell
.
Ethical hackers: putting on the white hat
14
--
19
R. Sreeram Sreenivas
,
R. Anitha
.
Detecting keyloggers based on traffic analysis with periodic behaviour
Volume
2011
, Issue
6
5
--
8
Steve Durbin
.
Tackling converged threats: building a security-positive environment
8
--
12
Tracey Caldwell
.
When worlds collide: the security of converged networks
12
--
14
Jeff Hudson
.
Weaponised malware: how criminals use digital certificates to cripple your organisation
15
--
17
Steve Gold
.
The rebirth of phreaking
17
--
19
Marc Hocking
.
Thin client security in the cloud
Volume
2011
, Issue
5
5
--
8
Danny Bradbury
.
Routing around censorship
8
--
12
Aditya K. Sood
,
Richard J. Enbody
.
Spying on the browser: dissecting the design of malicious extensions
13
--
15
Steve Gold
.
Taking down botnets
16
--
19
Ravi Chandra Jammalamadaka
,
Sharad Mehrotra
,
Nalini Venkatasubramanian
,
Kent E. Seamons
.
DataVault: secure mobile access and data sharing
Volume
2011
, Issue
4
5
--
9
Tracey Caldwell
.
Smart security
9
--
12
Andy Kemshall
.
Why mobile two-factor authentication makes sense
12
--
15
Steve Gold
.
Cracking GSM
15
--
17
Richard Blandford
.
Information security in the cloud
18
--
19
Steve Jenkins
.
Learning to love SIEM
Volume
2011
, Issue
3
4
--
10
Mark John Taylor
,
John Haggerty
,
David Gresty
,
David J. Lamb
.
Forensic investigation of cloud computing systems
10
--
12
Russell Sanderson
.
A secure data protection strategy
12
--
15
Shadi Aljawarneh
.
A web engineering security methodology for e-learning systems
15
--
18
Steve Gold
.
IPv6 migration and security
18
--
19
Alexei Lesnykh
.
Data loss prevention: a matter of discipline
Volume
2011
, Issue
2
4
--
8
Steve Durbin
.
Information security without boundaries
9
--
12
Danny Bradbury
.
Hacking wifi the easy way
13
--
15
Steve Gold
.
The future of the firewall
16
--
17
David Ting
.
Thinking thin: addressing the challenges of client computing
18
--
19
Michael Hamelin
.
Preparing for a firewall audit
Volume
2011
, Issue
12
5
--
12
Steve Mansfield-Devine
.
DDoS: threats and mitigation
12
--
14
Jérémy D'Hoinne
.
Could 'wait and see' be the best IPv6 strategy?
15
--
17
Steve Gold
.
Understanding the hacker psyche
18
--
19
Florian Malecki
.
A deeper, broader look at network security
Volume
2011
, Issue
11
5
--
9
Frank Andrus
.
Beyond scan and block: an adaptive approach to network access control
9
--
11
Gordon Thomson
.
APTs: a poorly understood challenge
12
--
14
Klaus Gheri
.
The benefits of application detection
14
--
18
Steve Gold
.
Cracking wireless networks
18
--
20
Stuart Facey
.
Who's in control: a six-step strategy for secure IT
Volume
2011
, Issue
10
5
--
7
Steve Gold
.
Android insecurity
8
--
12
Aditya K. Sood
,
Richard J. Enbody
.
Frametrapping the framebusting defence
12
--
14
James Harris
.
Defending the network several times over
14
--
18
Rohan Nanda
,
P. Venkata Krishna
.
Mitigating denial of service attacks in hierarchical wireless sensor networks
18
--
19
Richard Morrell
,
Akash Chandrashekar
.
Cloud computing: new challenges and opportunities
Volume
2011
, Issue
1
4
--
10
Steve Mansfield-Devine
.
Anonymous: serious threat or mere annoyance?
10
--
16
Edward Amoroso
.
Cyber attacks: awareness
16
--
19
Steve Gold
.
Advanced evasion techniques