Abstract is missing.
- AntiPhish: lessons learntAndré Bergholz. 1-2 [doi]
- Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detectionYu-Shu Chen, Yi-Ming Chen. 3-9 [doi]
- Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-makingOlivier Thonnard, Wim Mees, Marc Dacier. 11-21 [doi]
- Malware detection using statistical analysis of byte-level file contentS. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq. 23-31 [doi]
- Online phishing classification using adversarial data mining and signaling gamesGaston L Huillier, Richard Weber, Nicolas Figueroa. 33-42 [doi]
- Data security and integrity: developments and directionsBhavani M. Thuraisingham. 43 [doi]
- Towards trusted intelligence information sharingJoseph V. Treglia, Joon S. Park. 45-52 [doi]
- Social networks integration and privacy preservation using subgraph generalizationChristopher C. Yang, Xuning Tang. 53-61 [doi]
- Design of a temporal geosocial semantic web for military stabilization and reconstruction operationsBhavani M. Thuraisingham, Latifur Khan, Murat Kantarcioglu, Vaibhav Khadilkar. 63-74 [doi]
- On the efficacy of data mining for security applicationsTed E. Senator. 75-83 [doi]
- A study of online service and information exposure of public companiesS. H. Kwok, Anthony C. T. Lai, Jason C. K. Yeung. 85-90 [doi]