default search action
Information Security Journal: A Global Perspective, Volume 18
Volume 18, Number 1, 2009
- Kenneth Geers:
The Cyber Threat to National Critical Infrastructures: Beyond Theory. 1-7 - Daniel D. Hein, Hossein Saiedian:
Secure Software Engineering: Learning from the Past to Address Future Challenges. 8-25 - Mimi Herrmann:
Security Strategy: From Soup to Nuts. 26-32 - James A. Scholz:
Securing Critical IT Infrastructure. 33-39 - Scott D. Applegate:
Social Engineering: Hacking the Wetware! 40-46 - Alexander Mwaura Ng'ang'a:
Toward a Regional ICT Hub: Need for Cyber Laws in Kenya. 47-50
Volume 18, Number 2, 2009
- Todd Borandi:
Introduction to Secure Global Collaboration. 51-56 - Lee Parrish, Mark Leary:
Secure Global Collaboration Among Critical Infrastructures. 57-63 - Victoria Galante:
Practical Role-Based Access Control. 64-73 - S. Malliga, A. Tamilarasi:
Collaborative Framework for Detection, Prevention, and Traceback of Flooding Attacks Using Marking and Filtering. 74-86 - Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi:
Capturing Returned Computable Values in AspectJ for Security Hardening. 87-98 - Jyotsna Singh, Parul Garg, Alok Nath De:
A Combined Watermarking and Encryption Algorithm for Secure VoIP. 99-105
Volume 18, Number 3, 2009
- Miroslaw Ryba, Aleksander Poniewierski, Józef Sulwinski, Mateusz Górnisiewicz:
The Methodology for Managing the Abuse of IT Systems. 107-115 - Christopher Reinhold, Mark N. Frolick, Adekunle Okunoye:
Managing Your Security Future. 116-123 - Michael T. Hoesing:
Virtualization Security Assessment. 124-130 - Lo'ai Ali Tawalbeh, Saed Swedan, Adnan Abdul-Aziz Gutub:
Efficient Modular Squaring Algorithms for Hardware Implementation in GF(p). 131-138 - Zeeshan Shafi Khan, Muhammad Sher, Khalid Rashid, Aneel Rahim:
A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging. 139-148 - John J. Trinckes Jr.:
From the Field: A Hacker's Story. 149-151
Volume 18, Number 4, 2009
- Abdul Nasir Khan, Kalim Qureshi, Sumair Khan:
Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing. 153-162 - Brett J. L. Landry, M. Scott Koger, Sandra Blanke, Christian Nielsen:
Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters. 163-169 - Varun Sharma:
Testing Role-based Authorization Controls in Websites. 170-177 - Abdelrahman Desoky:
Notestega: Notes-based Steganography Methodology. 178-193 - John Davis:
Safe Harbor Data Privacy and Security for European Union Employee Data. 194-198
Volume 18, Number 5, 2009
- Hadi Otrok, Benwen Zhu, Hamdi Yahyaoui, Prabir Bhattacharya:
An Intrusion Detection Game Theoretical Model. 199-212 - Derrick Hyatt:
Web 2.0 Injection Infection Vulnerability Class. 213-223 - Brij B. Gupta, Ramesh Chandra Joshi, Manoj Misra:
Defending against Distributed Denial of Service Attacks: Issues and Challenges. 224-247 - E. A. Mary Anita, V. Vasudevan:
Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure. 248-256 - Panagiota Lagou, Gregory Chondrokoukis:
Survey on Nonrepudiation: Digital Signature Versus Biometrics. 257-266 - Eswar Karthikeyan:
Modified Lim-Lee Combing Using Signed Window and Direct Doublings. 267-271
Volume 18, Number 6, 2009
- Jonathan Matusitz:
A Postmodern Theory of Cyberterrorism: Game Theory. 273-281 - Tomasz Müldner, Gregory Leighton, Jan Krzysztof Miziolek:
Parameterized Role-Based Access Control Policies for XML Documents. 282-296 - Lance Hayden:
Designing Common Control Frameworks: A Model for Evaluating Information Technology Governance, Risk, and Compliance Control Rationalization Strategies. 297-305 - Anil Kumar, Mrinal Kanti Ghose:
Overview of Information Security Using Genetic Algorithm and Chaos. 306-315
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.