Volume 26,
Number 1,
February 2007
- E. Eugene Schultz:
What infosec changes are likely to result from the recent US election?
1-2
Electronic Edition (link) BibTeX
- Security Views - Malware Update.
3-13 BibTeX
- Chris Roberts:
Biometric attack vectors and defences.
14-25
Electronic Edition (link) BibTeX
- Ray Bernard:
Information Lifecycle Security Risk Assessment: A tool for closing security gaps.
26-30
Electronic Edition (link) BibTeX
- Danny Bradbury:
Decoding digital rights management.
31-33
Electronic Edition (link) BibTeX
- Steven Furnell:
IFIP workshop - Information security culture.
35
Electronic Edition (link) BibTeX
- Lynette Drevin, Hennie A. Kruger, Tjaart Steyn:
Value-focused assessment of ICT security awareness in an academic environment.
36-43
Electronic Edition (link) BibTeX
- Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski:
Bridging the gap between general management and technicians - A case study on ICT security in a developing country.
44-55
Electronic Edition (link) BibTeX
- A. B. Ruighaver, S. B. Maynard, S. Chang:
Organisational security culture: Extending the end-user perspective.
56-62
Electronic Edition (link) BibTeX
- Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen:
A video game for cyber security training and awareness.
63-72
Electronic Edition (link) BibTeX
- Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson:
Phishing for user security awareness.
73-80
Electronic Edition (link) BibTeX
- Stanley R. M. Oliveira, Osmar R. Zaïane:
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration.
81-93
Electronic Edition (link) BibTeX
- Rongxing Lu, Zhenfu Cao:
Simple three-party key exchange protocol.
94-97
Electronic Edition (link) BibTeX
Volume 26,
Number 2,
March 2007
Volume 26,
Number 3,
May 2007
- E. Eugene Schultz:
Mobile computing: The next Pandora's Box.
187
Electronic Edition (link) BibTeX
- Iosif-Viorel Onut, Ali A. Ghorbani:
SVision: A novel visual network-anomaly identification technique.
201-212
Electronic Edition (link) BibTeX
- Tao Li, Zhihong Guan, Xianyong Wu:
Modeling and analyzing the spread of active worms based on P2P systems.
213-218
Electronic Edition (link) BibTeX
- Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray:
Measuring, analyzing and predicting security vulnerabilities in software systems.
219-228
Electronic Edition (link) BibTeX
- Gerald V. Post, Albert Kagan:
Evaluating information security tradeoffs: Restricting access can interfere with user tasks.
229-237
Electronic Edition (link) BibTeX
- Xiaoyan Chen, Bobby N. W. Ma, Cungang Yang:
M-CLIQUES: Modified CLIQUES key agreement for secure multicast.
238-245
Electronic Edition (link) BibTeX
- Bogdan Ksiezopolski, Zbigniew Kotulski:
Adaptable security mechanism for dynamic environments.
246-255
Electronic Edition (link) BibTeX
- Albin Zuccato:
Holistic security management framework applied in electronic commerce.
256-265
Electronic Edition (link) BibTeX
Volume 26,
Number 4,
June 2007
- E. Eugene Schultz:
Struggles in the academic side of infosec.
267-268
Electronic Edition (link) BibTeX
- Eirik Albrechtsen:
A qualitative study of users' view on information security.
276-289
Electronic Edition (link) BibTeX
- Sushil K. Sharma, Joshua Sefchek:
Teaching information systems security courses: A hands-onapproach.
290-299
Electronic Edition (link) BibTeX
- Hyoungjoo Lee, Sungzoon Cho:
Retraining a keystroke dynamics-based authenticator with impostor patterns.
300-310
Electronic Edition (link) BibTeX
- Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura:
Masquerade detection by boosting decision stumps using UNIX commands.
311-318
Electronic Edition (link) BibTeX
- Ming-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang:
Dual-wrapped digital watermarking scheme for image copyright protection.
319-330
Electronic Edition (link) BibTeX
- Yuh-Min Tseng:
A resource-constrained group key agreement protocol for imbalanced wireless networks.
331-337
Electronic Edition (link) BibTeX
- Jun Li, Paul Knickerbocker:
Functional similarities between computer worms and biological pathogens.
338-347
Electronic Edition (link) BibTeX
Volume 26,
Number 5,
August 2007
- Hamid Reza Shahriari, Rasool Jalili:
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
349-360
Electronic Edition (link) BibTeX
- Guido Schryen:
The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis.
361-372
Electronic Edition (link) BibTeX
- Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris:
Authentication in a layered security approach for mobile ad hoc networks.
373-380
Electronic Edition (link) BibTeX
- Chih-Chien Wang, Sheng-Yi Chen:
Using header session messages to anti-spamming.
381-390
Electronic Edition (link) BibTeX
- Xosé A. Vila Sobrino, A. Schuster, Adolfo Riera:
Security for a Multi-Agent System based on JADE.
391-400
Electronic Edition (link) BibTeX
- Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan:
Comparative studies on authentication and key exchange methods for 802.11 wireless LAN.
401-409
Electronic Edition (link) BibTeX
- Steven Furnell, P. Bryant, Andrew D. Phippen:
Assessing the security perceptions of personal Internet users.
410-417
Electronic Edition (link) BibTeX
Volume 26,
Number 6,
September 2007
Volume 26,
Numbers 7-8,
December 2007
Copyright © Sat May 16 23:53:41 2009
by Michael Ley (ley@uni-trier.de)