


default search action
Computers & Security, Volume 26
Volume 26, Number 1, February 2007
- E. Eugene Schultz:

What infosec changes are likely to result from the recent US election? 1-2 - Security Views - Malware Update. Comput. Secur. 26(1): 3-13 (2007)

- Chris Roberts:

Biometric attack vectors and defences. 14-25 - Ray Bernard:

Information Lifecycle Security Risk Assessment: A tool for closing security gaps. 26-30 - Danny Bradbury:

Decoding digital rights management. 31-33 - Steven Furnell

:
IFIP workshop - Information security culture. 35 - Lynette Drevin

, Hennie A. Kruger
, Tjaart Steyn:
Value-focused assessment of ICT security awareness in an academic environment. 36-43 - Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski:

Bridging the gap between general management and technicians - A case study on ICT security in a developing country. 44-55 - Anthonie B. Ruighaver, Sean B. Maynard

, Shanton Chang
:
Organisational security culture: Extending the end-user perspective. 56-62 - Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen:

A video game for cyber security training and awareness. 63-72 - Ronald C. Dodge, Curtis A. Carver, Aaron J. Ferguson:

Phishing for user security awareness. 73-80 - Stanley R. M. Oliveira, Osmar R. Zaïane:

A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration. 81-93 - Rongxing Lu, Zhenfu Cao

:
Simple three-party key exchange protocol. 94-97
Volume 26, Number 2, March 2007
- E. Eugene Schultz:

Windows Vista: Microsoft's brave new world. 99 - Malware Update. Comput. Secur. 26(2): 100-108 (2007)

- Nathan L. Clarke

, Steven Furnell
:
Advanced user authentication for mobile devices. 109-119 - Konstantina Stoupa, Athena Vakali

:
Clustering subjects in a credential-based access control framework. 120-129 - Michael Gaiman, Rahul Simha, Bhagirath Narahari:

Privacy-preserving programming using sython. 130-136 - Jianhua Yang, Shou-Hsuan Stephen Huang:

Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. 137-144 - Sangkyun Kim, Hong Joo Lee:

A study on decision consolidation methods using analytic models for security systems. 145-153 - Oleksiy Mazhelis, Seppo Puuronen:

A framework for behavior-based detection of user substitution in a mobile context. 154-176 - Ilan Oshri

, Julia Kotlarsky, Corey Hirsch:
Information security in networkable Windows-based operating system devices: Challenges and solutions. 177-182 - Christopher J. Novak:

Investigative response: After the breach. 183-185
Volume 26, Number 3, May 2007
- E. Eugene Schultz:

Mobile computing: The next Pandora's Box. 187 - Iosif-Viorel Onut, Ali A. Ghorbani:

SVision: A novel visual network-anomaly identification technique. 201-212 - Tao Li, Zhi-Hong Guan, Xianyong Wu:

Modeling and analyzing the spread of active worms based on P2P systems. 213-218 - Omar Hussain Alhazmi

, Yashwant K. Malaiya, Indrajit Ray:
Measuring, analyzing and predicting security vulnerabilities in software systems. 219-228 - Gerald V. Post, Albert Kagan:

Evaluating information security tradeoffs: Restricting access can interfere with user tasks. 229-237 - Xiaoyan Chen, Bobby Ngok-Wah Ma, Cungang Yang:

M-CLIQUES: Modified CLIQUES key agreement for secure multicast. 238-245 - Bogdan Ksiezopolski

, Zbigniew Kotulski
:
Adaptable security mechanism for dynamic environments. 246-255 - Albin Zuccato:

Holistic security management framework applied in electronic commerce. 256-265
Volume 26, Number 4, June 2007
- E. Eugene Schultz:

Struggles in the academic side of infosec. 267-268 - Eirik Albrechtsen:

A qualitative study of users' view on information security. 276-289 - Sushil K. Sharma, Joshua Sefchek:

Teaching information systems security courses: A hands-onapproach. 290-299 - Hyoungjoo Lee, Sungzoon Cho:

Retraining a keystroke dynamics-based authenticator with impostor patterns. 300-310 - Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura:

Masquerade detection by boosting decision stumps using UNIX commands. 311-318 - Ming-Chiang Hu, Der-Chyuan Lou

, Ming-Chang Chang:
Dual-wrapped digital watermarking scheme for image copyright protection. 319-330 - Yuh-Min Tseng:

A resource-constrained group key agreement protocol for imbalanced wireless networks. 331-337 - Jun Li, Paul Knickerbocker:

Functional similarities between computer worms and biological pathogens. 338-347
Volume 26, Number 5, August 2007
- Hamid Reza Shahriari

, Rasool Jalili:
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. 349-360 - Guido Schryen:

The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis. 361-372 - Nikos Komninos

, Dimitrios D. Vergados
, Christos Douligeris:
Authentication in a layered security approach for mobile ad hoc networks. 373-380 - Chih-Chien Wang

, Sheng-Yi Chen:
Using header session messages to anti-spamming. 381-390 - Xosé A. Vila Sobrino, Alexander Schuster, Adolfo Riera:

Security for a Multi-Agent System based on JADE. 391-400 - Jun Lei, Xiaoming Fu

, Dieter Hogrefe, Jianrong Tan:
Comparative studies on authentication and key exchange methods for 802.11 wireless LAN. 401-409 - Steven Furnell

, P. Bryant, Andrew D. Phippen
:
Assessing the security perceptions of personal Internet users. 410-417
Volume 26, Number 6, September 2007
- Stuart P. Goring, Joseph R. Rabaiotti, Antonia J. Jones:

Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences. 421-426 - Ming Yu, Xi-Yuan Zhou:

An adaptive method for anomaly detection in symmetric network traffic. 427-433 - Steven Furnell

:
Making security usable: Are things improving? 434-443
Volume 26, Numbers 7-8, December 2007
- Steven Furnell

:
An assessment of website password practices. 445-451 - Ik Rae Jeong, Dong Hoon Lee:

Key agreement for key hypergraph. 452-458 - Yang Li, Li Guo:

An active learning based TCM-KNN algorithm for supervised network intrusion detection. 459-467 - Philip M. Rodwell, Steven Furnell

, Paul L. Reynolds:
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. 468-478 - Jianhua Yang, Shou-Hsuan Stephen Huang

:
Mining TCP/IP packets to detect stepping-stone intrusion. 479-484 - Danny Bradbury:

The security challenges inherent in VoIP. 485-487 - Alok Sharma

, Arun K. Pujari, Kuldip K. Paliwal
:
Intrusion detection using text processing techniques with a kernel based similarity measure. 488-495 - Florian P. Buchholz, Eugene H. Spafford

:
Run-time label propagation for forensic audit data. 496-513

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














