


default search action
Computers & Security, Volume 26
Volume 26, Number 1, February 2007
- E. Eugene Schultz:
What infosec changes are likely to result from the recent US election? 1-2 - Security Views - Malware Update. Comput. Secur. 26(1): 3-13 (2007)
- Chris Roberts:
Biometric attack vectors and defences. 14-25 - Ray Bernard:
Information Lifecycle Security Risk Assessment: A tool for closing security gaps. 26-30 - Danny Bradbury:
Decoding digital rights management. 31-33 - Steven Furnell
:
IFIP workshop - Information security culture. 35 - Lynette Drevin
, Hennie A. Kruger
, Tjaart Steyn:
Value-focused assessment of ICT security awareness in an academic environment. 36-43 - Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski:
Bridging the gap between general management and technicians - A case study on ICT security in a developing country. 44-55 - Anthonie B. Ruighaver, Sean B. Maynard
, Shanton Chang
:
Organisational security culture: Extending the end-user perspective. 56-62 - Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen:
A video game for cyber security training and awareness. 63-72 - Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson:
Phishing for user security awareness. 73-80 - Stanley R. M. Oliveira, Osmar R. Zaïane:
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration. 81-93 - Rongxing Lu, Zhenfu Cao
:
Simple three-party key exchange protocol. 94-97
Volume 26, Number 2, March 2007
- E. Eugene Schultz:
Windows Vista: Microsoft's brave new world. 99 - Malware Update. Comput. Secur. 26(2): 100-108 (2007)
- Nathan L. Clarke
, Steven Furnell
:
Advanced user authentication for mobile devices. 109-119 - Konstantina Stoupa, Athena Vakali
:
Clustering subjects in a credential-based access control framework. 120-129 - Michael Gaiman, Rahul Simha, Bhagirath Narahari:
Privacy-preserving programming using sython. 130-136 - Jianhua Yang, Shou-Hsuan Stephen Huang:
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. 137-144 - Sangkyun Kim, Hong Joo Lee:
A study on decision consolidation methods using analytic models for security systems. 145-153 - Oleksiy Mazhelis, Seppo Puuronen:
A framework for behavior-based detection of user substitution in a mobile context. 154-176 - Ilan Oshri
, Julia Kotlarsky, Corey Hirsch:
Information security in networkable Windows-based operating system devices: Challenges and solutions. 177-182 - Christopher J. Novak:
Investigative response: After the breach. 183-185
Volume 26, Number 3, May 2007
- E. Eugene Schultz:
Mobile computing: The next Pandora's Box. 187 - Iosif-Viorel Onut, Ali A. Ghorbani:
SVision: A novel visual network-anomaly identification technique. 201-212 - Tao Li, Zhi-Hong Guan, Xianyong Wu:
Modeling and analyzing the spread of active worms based on P2P systems. 213-218 - Omar Hussain Alhazmi
, Yashwant K. Malaiya, Indrajit Ray:
Measuring, analyzing and predicting security vulnerabilities in software systems. 219-228 - Gerald V. Post, Albert Kagan:
Evaluating information security tradeoffs: Restricting access can interfere with user tasks. 229-237 - Xiaoyan Chen, Bobby Ngok-Wah Ma, Cungang Yang:
M-CLIQUES: Modified CLIQUES key agreement for secure multicast. 238-245 - Bogdan Ksiezopolski
, Zbigniew Kotulski
:
Adaptable security mechanism for dynamic environments. 246-255 - Albin Zuccato:
Holistic security management framework applied in electronic commerce. 256-265
Volume 26, Number 4, June 2007
- E. Eugene Schultz:
Struggles in the academic side of infosec. 267-268 - Eirik Albrechtsen:
A qualitative study of users' view on information security. 276-289 - Sushil K. Sharma, Joshua Sefchek:
Teaching information systems security courses: A hands-onapproach. 290-299 - Hyoungjoo Lee, Sungzoon Cho:
Retraining a keystroke dynamics-based authenticator with impostor patterns. 300-310 - Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura:
Masquerade detection by boosting decision stumps using UNIX commands. 311-318 - Ming-Chiang Hu, Der-Chyuan Lou
, Ming-Chang Chang:
Dual-wrapped digital watermarking scheme for image copyright protection. 319-330 - Yuh-Min Tseng:
A resource-constrained group key agreement protocol for imbalanced wireless networks. 331-337 - Jun Li, Paul Knickerbocker:
Functional similarities between computer worms and biological pathogens. 338-347
Volume 26, Number 5, August 2007
- Hamid Reza Shahriari
, Rasool Jalili:
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. 349-360 - Guido Schryen:
The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis. 361-372 - Nikos Komninos
, Dimitrios D. Vergados
, Christos Douligeris:
Authentication in a layered security approach for mobile ad hoc networks. 373-380 - Chih-Chien Wang
, Sheng-Yi Chen:
Using header session messages to anti-spamming. 381-390 - Xosé A. Vila Sobrino, Alexander Schuster, Adolfo Riera:
Security for a Multi-Agent System based on JADE. 391-400 - Jun Lei, Xiaoming Fu
, Dieter Hogrefe, Jianrong Tan:
Comparative studies on authentication and key exchange methods for 802.11 wireless LAN. 401-409 - Steven Furnell
, P. Bryant, Andrew D. Phippen
:
Assessing the security perceptions of personal Internet users. 410-417
Volume 26, Number 6, September 2007
- Stuart P. Goring, Joseph R. Rabaiotti, Antonia J. Jones:
Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences. 421-426 - Ming Yu, Xi-Yuan Zhou:
An adaptive method for anomaly detection in symmetric network traffic. 427-433 - Steven Furnell
:
Making security usable: Are things improving? 434-443
Volume 26, Numbers 7-8, December 2007
- Steven Furnell
:
An assessment of website password practices. 445-451 - Ik Rae Jeong, Dong Hoon Lee:
Key agreement for key hypergraph. 452-458 - Yang Li, Li Guo:
An active learning based TCM-KNN algorithm for supervised network intrusion detection. 459-467 - Philip M. Rodwell, Steven Furnell
, Paul L. Reynolds:
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. 468-478 - Jianhua Yang, Shou-Hsuan Stephen Huang
:
Mining TCP/IP packets to detect stepping-stone intrusion. 479-484 - Danny Bradbury:
The security challenges inherent in VoIP. 485-487 - Alok Sharma
, Arun K. Pujari, Kuldip K. Paliwal
:
Intrusion detection using text processing techniques with a kernel based similarity measure. 488-495 - Florian P. Buchholz, Eugene H. Spafford
:
Run-time label propagation for forensic audit data. 496-513

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.