Abstract is missing.
- Encryption of multimedia medical content using programmable cellular automataPetre Anghelescu. 11-16 [doi]
- IAMS framework: A new framework for acceptable user experiences for integrating physical and virtual identity access management systemsSara Jeza Alotaibi, Mike Wald. 17-22 [doi]
- Neuro-cryptanalysis of DESMohammed M. Alani. 23-27 [doi]
- The implementation of a full EMV smartcard for a point-of-sale transactionOludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 28-35 [doi]
- Smart crawlers for flash-crowd DDoS: The attacker's perspectiveDimitry Drinfeld, Natalija Vlajic. 37-44 [doi]
- A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignmentFrancisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish. 45-50 [doi]
- Enforcing location privacy policies through an AOP-based reference monitorThomas Scheffler, Sven Schindler, Bettina Schnor. 51-56 [doi]
- DynFire: Dynamic firewalling in heterogeneous environmentsAlexander Vensmer, Sebastian Kiesel. 57-58 [doi]
- Compartmentalization architectures for protection of Internet credentials and transactions from CPU resident malware: Providing foolproof protection for critical credentials and transactionsJim McAlear. 60-65 [doi]
- Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technologyM. Fahim Ferdous Khan, Ken Sakamura. 66-70 [doi]
- Security concept of individual identification in academic environment of CTU in PragueRadek Holy, Jana Kalikova, Jan Scherks. 71-76 [doi]
- A practical business security framework to combat malware threatP. R. Lakshmi Eswari, N. Sarat Chandra Babu. 77-80 [doi]
- Root cause analysis of session management and broken authentication vulnerabilitiesDaniel Huluka, Oliver Popov. 82-86 [doi]
- The effects of loss profiles in interdependent network securityC. F. Larry Heimann, Alan Nochenson. 87-92 [doi]
- Fastest multi-scalar multiplication based on optimal double-base chainsVorapong Suppakitpaisarn, Hiroshi Imai, Masato Edahiro. 93-98 [doi]
- The study of evasion of packed PE from static detectionMirza Baig, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 99-104 [doi]
- Machine learning approach towards email managementTaiwo Ayodele, Galyna A. Akmayeva, Charles A. Shoniregun. 106-109 [doi]
- Single Sign-On for multiple unified communications applicationsPing Lin, Sunil Menon, Shailesh Patel, Lin Lin. 110-116 [doi]
- Security challenges and countermeasures for trusted virtualized computing environmentsTyson Brooks, Carlos Caicedo, Joon Park. 117-122 [doi]
- Developing compositional ontology alignment frameworkSaid Rabah Azzam, Shikun Zhou. 123-125 [doi]
- Remote agent based automated framework for threat modelling, vulnerability testing of SOA solutions and web servicesPrithviraj Patil, Sunil Pawar. 127-131 [doi]
- VLUS: Visual location-based URL screening tool for improved WWW securityAlex Naumov, Natalija Vlajic, Hamzeh Roumani. 132-138 [doi]
- The Mask-SIFT cascading classifier for pornography detectionChad M. S. Steel. 139-142 [doi]
- Implementing it governance using COBIT: A case study focusing on critical success factorsArun Nagarle Shivashankarappa, Leonid Smalov, Dharmalingam Ramalingam, N. Anbazhagan. 144-149 [doi]
- A COBIT and NIST-based conceptual framework for enterprise user account lifecycle managementCyril Ikenna Nwafor, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 150-157 [doi]
- An analysis of security weaknesses in the evolution of RFID enabled passportEyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 158-166 [doi]
- Fully-secure and efficient pairing-free certificateless authenticated key agreement protocolNashwa A. F. Mohamed, Mohsin H. A. Hashim, Eihab B. M. Bashier, Mohammed Hassouna. 167-172 [doi]
- Logging in XML databases: Xlog file for trust based access controlNorah Farooqi, Siobhán North. 174-175 [doi]
- Bayesian networks for modeling failure dependency in access control modelsSaad S. AlAboodi, Gordon B. Agnew. 176-182 [doi]
- Security architecture for Ad hoc NOMOHi networks: Development of a project based on emergency rural telecommunicationsJuan José Martínez Castillo, Karina Aviles Rodriguez. 183-187 [doi]
- A case study in open source software security and privacy: Android adwareEmre Erturk. 189-191 [doi]
- Enhanced side-channel analysis method to detect hardware virtualization based rootkitsIain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 192-201 [doi]
- Towards trusted data management in online social network (OSN) servicesJoon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat. 202-203 [doi]
- Small DDoS defense system using routing deployment methodHo Seok Kang, Sung-Ryul Kim. 204-206 [doi]
- Anti-phishing prevention measure for email systemsTaiwo Ayodele, Charles A. Shoniregun, Galyna A. Akmayeva. 208-211 [doi]
- Collusion threat profile analysis: Review and analysis of MERIT modelAdetorera Sogbesan, Ayo Ibidapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 212-217 [doi]
- Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phaseas neededDes Fernando, Pavol Zavarsky. 218-222 [doi]
- The study of civil litigation in data storage environmentPrince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 224-230 [doi]
- Digital forensic research - The analysis of user input on volatile memory of Windows applicationFunminiyi Olajide, Nick Savage, Galyna A. Akmayeva, Charles A. Shoniregun. 231-238 [doi]
- Dirt Jumper: A key player in today's botnet-for-DDoS marketM. Andrade, Natalija Vlajic. 239-244 [doi]
- Using associative memories in coding theory for communication channelsConstantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban. 245-248 [doi]