default search action
Information Security Journal: A Global Perspective, Volume 23
Volume 23, Numbers 1-2, 2014
- Mona Dara, Kooroush Manochehri:
Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. 1-9 - Mohd Zalisham Jali, Steven M. Furnell, Paul Dowland:
Investigating the Viability of Multifactor Graphical Passwords for User Authentication. 10-21 - Miguel Morales-Sandoval, Ana Karina Vega Castillo, Arturo Diaz-Perez:
A Secure Scheme for Storage, Retrieval, and Sharing of Digital Documents in Cloud Computing Using Attribute-Based Encryption on Mobile Devices. 22-31 - Bartosz Inglot, Lu Liu:
Enhanced Timeline Analysis for Digital Forensic Investigations. 32-44
- Panagiota Polymeropoulou:
Book Review: Graves, Michael W. Digital Archaeology: The Art and Science of Digital Forensics - Upper Saddle River, NJ: Addison-Wesley, 2013, 600p., $79.99. ISBN: 978-0-321-803-90-0. 45 - Nicolas Sklavos:
Book Review: Wu, Chwan-Hwa, and Irwin, J. David. Introduction to Computer Networks and Cybersecurity - Boca Raton, FL: CRC Press/Taylor & Francis Group, 2013, 1236p., $130.00. ISBN 1466572132. 46 - Nicolas Sklavos:
Book Review: Samuelle, T.J. Mike Meyers' CompTIA Security + Certification Passport (Exam SY0-301) - 3rd ed. New York: McGraw-Hill Osborne Media, 2011, 480p., $30.00. ISBN: 13: 978-0071770385. 47-48 - Nicolas Sklavos:
Book Review: Stallings, W. Cryptography and Network Security: Principles and Practice - 6th ed. Upper Saddle River, NJ: Prentice Hall, 2013, 752p., $142.40. ISBN: 13: 978-0133354690. 49-50 - Nicolas Sklavos:
Book Review: Sullivan, Bryan, and Liu, Vincent. Web Application Security, A Beginner's Guide - McGraw-Hill Osborne Media, Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 352p., $40.00. ISBN: 10: 0071776168, ISBN: 13: 978-0071776165. 51 - Nicolas Sklavos:
Book Review: Bahadur, Gary, Inasi, Jason, and de Carvalho, Alex. Securing the Clicks: Network Security in the Age of Social Media - McGraw-Hill Osborne Media, 2011, 368p., $40.00. ISBN: 10: 0071769056, ISBN: 13: 978-0071769051. 52-53 - Nicolas Sklavos:
Book Review: Wong, Caroline. Security Metrics, A Beginner's Guide - McGraw-Hill Osborne Media, A Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 432p., $40.00. ISBN: 10: 0071744002, ISBN: 13: 978-0071744003. 54 - Nicolas Sklavos:
Book Review: Shavers, Brett. Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. 55-56
Volume 23, Number 3, 2014
- Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio, Paolo Di Notte:
Metamorphic Malware Detection Using Code Metrics. 57-67 - Hardikkumar Rana, Mark Stamp:
Hunting for Pirated Software Using Metamorphic Analysis. 68-85 - Sanchika Gupta, Padam Kumar:
System cum Program-Wide Lightweight Malicious Program Execution Detection Scheme for Cloud. 86-99 - John Mark Chasser:
IPv6 Implementation Decisions for an Organization. 100-106 - Jaydeep Solanki, Aenik Shah, Manik Lal Das:
Secure Patrol: Patrolling Against Buffer Overflow Exploits. 107-117 - Brian A. Lozada:
The Emerging Technology of Predictive Analytics: Implications for Homeland Security. 118-122
Volume 23, Numbers 4-6, 2014
- Olga Angelopoulou:
Introduction to the Special Issue. 123-124 - Konstantinia Charitoudi, Andrew J. C. Blyth:
An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense. 125-136 - Hossain Shahriar, Vamshee Krishna Devendran:
Classification of Clickjacking Attacks and Detection Techniques. 137-147 - Shahrzad Zargari, Anthony Smith:
Policing as a Service in the Cloud. 148-158 - Zhen Li, Qi Liao:
Toward a Monopoly Botnet Market. 159-171 - Arun Warikoo:
Proposed Methodology for Cyber Criminal Profiling. 172-178
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.