- 2010
- Dattatraya S. Adane, S. R. Sathe:
A Security Model for Securing Data in Multiagent Applications. Inf. Secur. J. A Glob. Perspect. 19(1): 11-21 (2010) - S. A. Arunmozhi, Y. Venkataramani:
A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks. Inf. Secur. J. A Glob. Perspect. 19(5): 263-272 (2010) - Satyanandan B. Atyam:
Effectiveness of Security Control Risk Assessments for Enterprises: Assess on the Business Perspective of Security Risks. Inf. Secur. J. A Glob. Perspect. 19(6): 343-350 (2010) - Rachid Beghdad:
Critical Study of Supervised Learning Techniques in Predicting Attacks. Inf. Secur. J. A Glob. Perspect. 19(1): 22-35 (2010) - John Mark Chasser:
Security Concerns in IPv6 and Transition Networks. Inf. Secur. J. A Glob. Perspect. 19(5): 282-293 (2010) - Irene E. Edge:
Employ Five Fundamental Principles to Produce a SOLID, Secure Network. Inf. Secur. J. A Glob. Perspect. 19(3): 153-159 (2010) - Rhonda Farrell:
Securing the Cloud - Governance, Risk, and Compliance Issues Reign Supreme. Inf. Secur. J. A Glob. Perspect. 19(6): 310-319 (2010) - Apostolos P. Fournaris:
Trust Ensuring Crisis Management Hardware Module. Inf. Secur. J. A Glob. Perspect. 19(2): 74-83 (2010) - Constantine Gikas:
A General Comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS Standards. Inf. Secur. J. A Glob. Perspect. 19(3): 132-141 (2010) - Greg Gogolin, James Jones:
Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business. Inf. Secur. J. A Glob. Perspect. 19(3): 109-117 (2010) - Ankur Gupta, Lalit Kumar Awasthi:
A Containment-Based Security Model for Cycle-Stealing P2P Applications. Inf. Secur. J. A Glob. Perspect. 19(4): 191-203 (2010) - Anand Gupta, Shyam K. Gupta, Isha Manu Ganesh, Pankhuri Gupta, Vikram Goyal, Sangeeta Sabharwal:
Opaqueness Characteristic of a Context Honeypot System. Inf. Secur. J. A Glob. Perspect. 19(3): 142-152 (2010) - Jonathan Hanny:
Building an Application Security Program. Inf. Secur. J. A Glob. Perspect. 19(6): 336-342 (2010) - Klaus Julisch, Michael Hall:
Security and Control in the Cloud. Inf. Secur. J. A Glob. Perspect. 19(6): 299-309 (2010) - Avinash W. Kadam:
Personal Business Continuity Planning. Inf. Secur. J. A Glob. Perspect. 19(1): 4-10 (2010) - Vinay Kumar, Sunil Kumar Muttoo:
Graph Theoretic Approach to Steganography to Secure Message Digest. Inf. Secur. J. A Glob. Perspect. 19(6): 328-335 (2010) - Xi Li:
How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations for Every Language in NP. Inf. Secur. J. A Glob. Perspect. 19(3): 160-174 (2010) - Gavin Wylie Manes, Elizabeth Downing:
What Security Professionals Need to Know About Digital Evidence. Inf. Secur. J. A Glob. Perspect. 19(3): 124-131 (2010) - Michael Ste. Marie:
Do You Have a Disaster Recovery Plan? Inf. Secur. J. A Glob. Perspect. 19(1): 1-3 (2010) - David R. Matthews:
eDiscovery versus Computer Forensics. Inf. Secur. J. A Glob. Perspect. 19(3): 118-123 (2010) - Durgesh Kumar Mishra, Manohar Chandwani:
A Secured MultiParty Computational Protocol to Protect Cyber Space. Inf. Secur. J. A Glob. Perspect. 19(4): 175-181 (2010) - Virgil Mocanu:
Requirements for Security Enhancements to Legacy Software with RUP. Inf. Secur. J. A Glob. Perspect. 19(4): 226-236 (2010) - Enuma Orakwue:
Private Clouds: Secure Managed Services. Inf. Secur. J. A Glob. Perspect. 19(6): 295-298 (2010) - Jin Peng, Xin Zhao:
SSH-Based Device Identity and Trust Initialization. Inf. Secur. J. A Glob. Perspect. 19(5): 237-242 (2010) - Ralph Spencer Poore:
Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist. Inf. Secur. J. A Glob. Perspect. 19(2): 51-52 (2010) - Sean Price:
A Heuristic Search for Identifying Required Application Libraries Supporting a Run-Time Security Policy. Inf. Secur. J. A Glob. Perspect. 19(2): 100-108 (2010) - Fernando Roda, Luis Lara:
Chaotic Cipher Using the Duffing Equation. Inf. Secur. J. A Glob. Perspect. 19(6): 320-327 (2010) - Aaron D. Sanders:
Conficker: Lessons in Secure Software and System Design. Inf. Secur. J. A Glob. Perspect. 19(2): 95-99 (2010) - S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat:
Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field GF(2m) and Their Properties. Inf. Secur. J. A Glob. Perspect. 19(2): 84-94 (2010) - Siva S. Sivatha Sindhu, Arputharaj Kannan:
Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm. Inf. Secur. J. A Glob. Perspect. 19(4): 204-212 (2010)