default search action
Information Security Journal: A Global Perspective, Volume 24
Volume 24, Numbers 1-3, 2015
- Gianluca Lax, Francesco Buccafurri, Gianluca Caminiti:
Digital Document Signing: Vulnerabilities and Solutions. 1-14 - Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri:
A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. 15-23 - Paul Rabinovich:
Towards Better AAA in Identity Federations. 24-30 - Christopher Cox:
Cyber Capabilities and Intent of Terrorist Forces. 31-38 - Huw Read, Iain Sutherland, Konstantinos Xynos, Frode Roarson:
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems. 39-47 - Gregory Early, William Stott III:
Preemptive Security Through Information Analytics. 48-56 - Georgios Spanos, Lefteris Angelis:
Impact Metrics of Security Vulnerabilities: Analysis and Weighing. 57-71 - Karina Korpela:
Improving Cyber Security Awareness and Training Programs with Data Analytics. 72-77
Volume 24, Numbers 4-6, 2015
- Shijie Zhou:
A Survey on Fast-flux Attacks. 79-97
- Nanta Janpitak, Chanboon Sathitwiriyawong:
Automated Compliance Checking Methodology for Non-Log Operations. 98-108 - S. Srisakthi, A. P. Shanthi:
Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment. 109-117 - Manas Ranjan Nayak, Baidyanath Tudu, Abhishek Basu, Subir Kumar Sarkar:
On the Implementation of a Secured Digital Watermarking Framework. 118-126
- Neamen Negash, Xiangdong Che:
An Overview of Modern Botnets. 127-132
- Adebukola Onashoga, Olusola O. Abayomi-Alli, Adesina S. Sodiya, David A. Ojo:
An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System. 133-145 - Primoz Cigoj, Borka Jerman Blazic:
An Authentication and Authorization Solution for a Multiplatform Cloud Environment. 146-156 - Eric J. Smith, Nina A. Kollars:
QR Panopticism: User Behavior Triangulation and Barcode-Scanning Applications. 157-163 - Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George C. Oikonomou:
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. 164-176 - Richard G. Taylor:
Potential Problems with Information Security Risk Assessments. 177-184 - Nazmul Islam, Kazi Md. Rokibul Alam, Shaikh Shiam Rahman:
Commutative Re-encryption Techniques: Significance and Analysis. 185-193 - Su Zhang, Xinming Ou, Doina Caragea:
Predicting Cyber Risks through National Vulnerability Database. 194-206 - Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Secure Graphical One Time Password (GOTPass): An Empirical Study. 207-220
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.