![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Information Security Journal: A Global Perspective, Volume 24
Volume 24, Numbers 1-3, 2015
- Gianluca Lax
, Francesco Buccafurri
, Gianluca Caminiti:
Digital Document Signing: Vulnerabilities and Solutions. 1-14 - Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri:
A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. 15-23 - Paul Rabinovich:
Towards Better AAA in Identity Federations. 24-30 - Christopher Cox:
Cyber Capabilities and Intent of Terrorist Forces. 31-38 - Huw Read
, Iain Sutherland
, Konstantinos Xynos
, Frode Roarson:
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems. 39-47 - Gregory Early, William Stott III:
Preemptive Security Through Information Analytics. 48-56 - Georgios Spanos
, Lefteris Angelis:
Impact Metrics of Security Vulnerabilities: Analysis and Weighing. 57-71 - Karina Korpela:
Improving Cyber Security Awareness and Training Programs with Data Analytics. 72-77
Volume 24, Numbers 4-6, 2015
- Shijie Zhou:
A Survey on Fast-flux Attacks. 79-97
- Nanta Janpitak, Chanboon Sathitwiriyawong:
Automated Compliance Checking Methodology for Non-Log Operations. 98-108 - S. Srisakthi, A. P. Shanthi:
Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment. 109-117 - Manas Ranjan Nayak
, Baidyanath Tudu, Abhishek Basu
, Subir Kumar Sarkar:
On the Implementation of a Secured Digital Watermarking Framework. 118-126
- Neamen Negash, Xiangdong Che:
An Overview of Modern Botnets. 127-132
- Adebukola Onashoga
, Olusola O. Abayomi-Alli
, Adesina S. Sodiya, David A. Ojo:
An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System. 133-145 - Primoz Cigoj, Borka Jerman Blazic:
An Authentication and Authorization Solution for a Multiplatform Cloud Environment. 146-156 - Eric J. Smith, Nina A. Kollars:
QR Panopticism: User Behavior Triangulation and Barcode-Scanning Applications. 157-163 - Theodoros Spyridopoulos
, Konstantinos Maraslis, Alexios Mylonas
, Theo Tryfonas
, George C. Oikonomou
:
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. 164-176 - Richard G. Taylor:
Potential Problems with Information Security Risk Assessments. 177-184 - Nazmul Islam, Kazi Md. Rokibul Alam, Shaikh Shiam Rahman:
Commutative Re-encryption Techniques: Significance and Analysis. 185-193 - Su Zhang, Xinming Ou, Doina Caragea
:
Predicting Cyber Risks through National Vulnerability Database. 194-206 - Hussain Alsaiari, Maria Papadaki
, Paul Dowland
, Steven Furnell
:
Secure Graphical One Time Password (GOTPass): An Empirical Study. 207-220
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.