61 | -- | 0 | Rainer Fahs, Vlasti Broucek. Letter from the EICAR Chairman |
63 | -- | 64 | Vlasti Broucek, Paul Turner. Foreword |
65 | -- | 74 | Eric Filiol, Sébastien Josse. A statistical model for undecidable viral detection |
75 | -- | 86 | Eric Filiol. Formalisation and implementation aspects of ::::K:::: -ary (malicious) codes |
87 | -- | 92 | Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos. A spatial stochastic model for worm propagation: scale effects |
93 | -- | 101 | Attila Ondi, Richard Ford. How good is good enough? Metrics for worm/anti-worm evaluation |
103 | -- | 111 | Vinoo Thomas, Nitin Jyoti. Bot countermeasures |
113 | -- | 123 | Sébastien Josse. Rootkit detection from outside the Matrix |
125 | -- | 134 | Gerald Tripp. Regular expression matching with input compression: a hardware design for use within network intrusion detection systems |
135 | -- | 141 | Jörg Preuß, Steven Furnell, Maria Papadaki. Considering the potential of criminal profiling to combat hacking |
143 | -- | 148 | Lizzie Coles-Kemp, Richard E. Overill. On the role of the Facilitator in information security risk assessment |
149 | -- | 161 | Urs E. Gattiker. Bologna process revisited: educating information security and malware experts |
163 | -- | 184 | Linfeng Li, Marko Helenius. Usability evaluation of anti-phishing toolbars |
185 | -- | 194 | Oliver Jorns, Oliver Jung, Gerald Quirchmayr. Transaction pseudonyms in mobile environments |