95 | -- | 109 | Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal. A new worm propagation threat in BitTorrent: modeling and analysis |
111 | -- | 125 | Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili. GTHBAC: A Generalized Temporal History Based Access Control Model |
127 | -- | 137 | Ali Ahmed, Ning Zhang. Towards the realisation of context-risk-aware access control in pervasive computing |
139 | -- | 152 | Elaine Hulitt, Rayford B. Vaughn. Information system security compliance to FISMA standard: a quantitative measure |
153 | -- | 163 | Wojciech Mazurczyk, Józef Lubacz. LACK - a VoIP steganographic method |
165 | -- | 176 | Nicholas M. Boers, Pawel Gburzynski, Ioanis Nikolaidis, Wladek Olesinski. Developing wireless sensor network applications in a virtual environment |
177 | -- | 190 | Aneta Poniszewska-Maranda. Conception approach of access control in heterogeneous information systems using UML |
191 | -- | 204 | Tomasz Mrugalski, Józef Wozniak. Analysis of IPv6 handovers in IEEE 802.16 environment |
205 | -- | 214 | Konrad Wrona, Geir Hallingstad. Real-time automated risk assessment in protected core networking |
215 | -- | 226 | Xun Dong, John A. Clark, Jeremy L. Jacob. Defending the weakest link: phishing websites detection by analysing user behaviours |
227 | -- | 247 | Josip Zoric. Analysis of service platforms by a portfolio approach |
249 | -- | 258 | Gang Uk Hwang, Fumio Ishizaki. Packet level performance analysis of a packet scheduler exploiting multiuser diversity |