Volume 27,
Numbers 1-2,
March 2008
- Stephen D. Wolthusen:
Editorial.
1
Electronic Edition (link) BibTeX
- Pilsung Kang, Sunghoon Park, Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho:
Improvement of keystroke data quality through artificial rhythms and cues.
3-11
Electronic Edition (link) BibTeX
- Lein Harn, Jian Ren:
Efficient identity-based RSA multisignatures.
12-15
Electronic Edition (link) BibTeX
- Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Cryptanalysis of simple three-party key exchange protocol.
16-21
Electronic Edition (link) BibTeX
- Evan E. Anderson, Joobin Choobineh:
Enterprise information security strategies.
22-29
Electronic Edition (link) BibTeX
- Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies:
A global security architecture for intrusion detection on computer networks.
30-47
Electronic Edition (link) BibTeX
- Francesco Palmieri, Ugo Fiore:
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies.
48-62
Electronic Edition (link) BibTeX
Volume 27,
Numbers 3-4,
May-June 2008
- Stephen D. Wolthusen:
Editorial.
63
Electronic Edition (link) BibTeX
- Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS session-aware user authentication revisited.
64-70
Electronic Edition (link) BibTeX
- Hein S. Venter, Jan H. P. Eloff, Y. L. Li:
Standardising vulnerability categories.
71-83
Electronic Edition (link) BibTeX
- Shi-Jinn Horng, Pingzhi Fan, Yao-Ping Chou, Yen-Cheng Chang, Yi Pan:
A feasible intrusion detector for recognizing IIS attacks based on neural networks.
84-100
Electronic Edition (link) BibTeX
- Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
An aspect-oriented approach for the systematic security hardening of code.
101-114
Electronic Edition (link) BibTeX
Short communication
Volume 27,
Numbers 5-6,
October 2008
- Stephen D. Wolthusen:
From the Editor-in-Chief.
123
Electronic Edition (link) BibTeX
- Mariana Gerber, Rossouw von Solms:
Information security requirements - Interpreting the legal aspects.
124-135
Electronic Edition (link) BibTeX
- Dimitris Gritzalis, Yannis Mallios:
A SIP-oriented SPIT Management Framework.
136-153
Electronic Edition (link) BibTeX
- Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff:
SMSSec: An end-to-end protocol for secure SMS.
154-167
Electronic Edition (link) BibTeX
- Rachid Beghdad:
Critical study of neural networks in detecting intrusions.
168-175
Electronic Edition (link) BibTeX
- Wes Masri, Andy Podgurski:
Application-based anomaly intrusion detection with dynamic information flow analysis.
176-187
Electronic Edition (link) BibTeX
- Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan:
Building network attack graph for alert causal correlation.
188-196
Electronic Edition (link) BibTeX
- Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timothy E. Levin:
Enforcing memory policy specifications in reconfigurable hardware.
197-215
Electronic Edition (link) BibTeX
- Hung-Yu Chien:
Practical anonymous user authentication scheme with security proof.
216-223
Electronic Edition (link) BibTeX
- E. Kritzinger, E. Smith:
Information security management: An information security retrieval and awareness model for industry.
224-231
Electronic Edition (link) BibTeX
Volume 27,
Numbers 7-8,
December 2008
- Stephen D. Wolthusen:
Editorial.
233-234
Electronic Edition (link) BibTeX
- Steven Furnell, Valleria Tsaganidi, Andrew D. Phippen:
Security beliefs and barriers for novice Internet users.
235-240
Electronic Edition (link) BibTeX
- Yacine Rezgui, Adam Marks:
Information security awareness in higher education: An exploratory study.
241-253
Electronic Edition (link) BibTeX
- H. A. Kruger, W. D. Kearney:
Consensus ranking - An ICT security awareness case study.
254-259
Electronic Edition (link) BibTeX
- Anthony J. Palmer:
Criteria to evaluate Automated Personal Identification Mechanisms.
260-284
Electronic Edition (link) BibTeX
- Dimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis:
An ontology-based policy for deploying secure SIP-based VoIP services.
285-297
Electronic Edition (link) BibTeX
- Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Secure log management for privacy assurance in electronic communications.
298-308
Electronic Edition (link) BibTeX
- Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez:
An optimistic fair exchange protocol based on signature policies.
309-322
Electronic Edition (link) BibTeX
- Arati Baliga, Liviu Iftode, Xiaoxin Chen:
Automated containment of rootkits attacks.
323-334
Electronic Edition (link) BibTeX
- Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against application servers.
335-354
Electronic Edition (link) BibTeX
- Jose R. C. Piqueira, Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, Vanessa O. Araujo:
Dynamic models for computer viruses.
355-359
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:53:41 2009
by Michael Ley (ley@uni-trier.de)