default search action
Computers & Security, Volume 26
Volume 26, Number 1, February 2007
- E. Eugene Schultz:
What infosec changes are likely to result from the recent US election? 1-2 - Security Views - Malware Update. Comput. Secur. 26(1): 3-13 (2007)
- Chris Roberts:
Biometric attack vectors and defences. 14-25 - Ray Bernard:
Information Lifecycle Security Risk Assessment: A tool for closing security gaps. 26-30 - Danny Bradbury:
Decoding digital rights management. 31-33 - Steven Furnell:
IFIP workshop - Information security culture. 35 - Lynette Drevin, Hennie A. Kruger, Tjaart Steyn:
Value-focused assessment of ICT security awareness in an academic environment. 36-43 - Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski:
Bridging the gap between general management and technicians - A case study on ICT security in a developing country. 44-55 - Anthonie B. Ruighaver, Sean B. Maynard, Shanton Chang:
Organisational security culture: Extending the end-user perspective. 56-62 - Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen:
A video game for cyber security training and awareness. 63-72 - Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson:
Phishing for user security awareness. 73-80 - Stanley R. M. Oliveira, Osmar R. Zaïane:
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration. 81-93 - Rongxing Lu, Zhenfu Cao:
Simple three-party key exchange protocol. 94-97
Volume 26, Number 2, March 2007
- E. Eugene Schultz:
Windows Vista: Microsoft's brave new world. 99 - Malware Update. Comput. Secur. 26(2): 100-108 (2007)
- Nathan L. Clarke, Steven Furnell:
Advanced user authentication for mobile devices. 109-119 - Konstantina Stoupa, Athena Vakali:
Clustering subjects in a credential-based access control framework. 120-129 - Michael Gaiman, Rahul Simha, Bhagirath Narahari:
Privacy-preserving programming using sython. 130-136 - Jianhua Yang, Shou-Hsuan Stephen Huang:
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. 137-144 - Sangkyun Kim, Hong Joo Lee:
A study on decision consolidation methods using analytic models for security systems. 145-153 - Oleksiy Mazhelis, Seppo Puuronen:
A framework for behavior-based detection of user substitution in a mobile context. 154-176 - Ilan Oshri, Julia Kotlarsky, Corey Hirsch:
Information security in networkable Windows-based operating system devices: Challenges and solutions. 177-182 - Christopher J. Novak:
Investigative response: After the breach. 183-185
Volume 26, Number 3, May 2007
- E. Eugene Schultz:
Mobile computing: The next Pandora's Box. 187 - Iosif-Viorel Onut, Ali A. Ghorbani:
SVision: A novel visual network-anomaly identification technique. 201-212 - Tao Li, Zhi-Hong Guan, Xianyong Wu:
Modeling and analyzing the spread of active worms based on P2P systems. 213-218 - Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray:
Measuring, analyzing and predicting security vulnerabilities in software systems. 219-228 - Gerald V. Post, Albert Kagan:
Evaluating information security tradeoffs: Restricting access can interfere with user tasks. 229-237 - Xiaoyan Chen, Bobby Ngok-Wah Ma, Cungang Yang:
M-CLIQUES: Modified CLIQUES key agreement for secure multicast. 238-245 - Bogdan Ksiezopolski, Zbigniew Kotulski:
Adaptable security mechanism for dynamic environments. 246-255 - Albin Zuccato:
Holistic security management framework applied in electronic commerce. 256-265
Volume 26, Number 4, June 2007
- E. Eugene Schultz:
Struggles in the academic side of infosec. 267-268 - Eirik Albrechtsen:
A qualitative study of users' view on information security. 276-289 - Sushil K. Sharma, Joshua Sefchek:
Teaching information systems security courses: A hands-onapproach. 290-299 - Hyoungjoo Lee, Sungzoon Cho:
Retraining a keystroke dynamics-based authenticator with impostor patterns. 300-310 - Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura:
Masquerade detection by boosting decision stumps using UNIX commands. 311-318 - Ming-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang:
Dual-wrapped digital watermarking scheme for image copyright protection. 319-330 - Yuh-Min Tseng:
A resource-constrained group key agreement protocol for imbalanced wireless networks. 331-337 - Jun Li, Paul Knickerbocker:
Functional similarities between computer worms and biological pathogens. 338-347
Volume 26, Number 5, August 2007
- Hamid Reza Shahriari, Rasool Jalili:
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. 349-360 - Guido Schryen:
The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis. 361-372 - Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris:
Authentication in a layered security approach for mobile ad hoc networks. 373-380 - Chih-Chien Wang, Sheng-Yi Chen:
Using header session messages to anti-spamming. 381-390 - Xosé A. Vila Sobrino, Alexander Schuster, Adolfo Riera:
Security for a Multi-Agent System based on JADE. 391-400 - Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan:
Comparative studies on authentication and key exchange methods for 802.11 wireless LAN. 401-409 - Steven Furnell, P. Bryant, Andrew D. Phippen:
Assessing the security perceptions of personal Internet users. 410-417
Volume 26, Number 6, September 2007
- Stuart P. Goring, Joseph R. Rabaiotti, Antonia J. Jones:
Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences. 421-426 - Ming Yu, Xi-Yuan Zhou:
An adaptive method for anomaly detection in symmetric network traffic. 427-433 - Steven Furnell:
Making security usable: Are things improving? 434-443
Volume 26, Numbers 7-8, December 2007
- Steven Furnell:
An assessment of website password practices. 445-451 - Ik Rae Jeong, Dong Hoon Lee:
Key agreement for key hypergraph. 452-458 - Yang Li, Li Guo:
An active learning based TCM-KNN algorithm for supervised network intrusion detection. 459-467 - Philip M. Rodwell, Steven Furnell, Paul L. Reynolds:
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. 468-478 - Jianhua Yang, Shou-Hsuan Stephen Huang:
Mining TCP/IP packets to detect stepping-stone intrusion. 479-484 - Danny Bradbury:
The security challenges inherent in VoIP. 485-487 - Alok Sharma, Arun K. Pujari, Kuldip K. Paliwal:
Intrusion detection using text processing techniques with a kernel based similarity measure. 488-495 - Florian P. Buchholz, Eugene H. Spafford:
Run-time label propagation for forensic audit data. 496-513
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.