


default search action
Information Security Journal: A Global Perspective, Volume 19
Volume 19, Number 1, 2010
- Michael Ste. Marie:

Do You Have a Disaster Recovery Plan? 1-3 - Avinash W. Kadam:

Personal Business Continuity Planning. 4-10 - Dattatraya S. Adane, S. R. Sathe:

A Security Model for Securing Data in Multiagent Applications. 11-21 - Rachid Beghdad

:
Critical Study of Supervised Learning Techniques in Predicting Attacks. 22-35 - Rama Lingeswara Tammineedi:

Business Continuity Management: A Standards-Based Approach. 36-50
Volume 19, Number 2, 2010
- Ralph Spencer Poore

:
Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist. 51-52 - Nicolas Sklavos

:
On the Hardware Implementation Cost of Crypto-Processors Architectures. 53-60 - Ju An Wang, Michael M. Guo, Jairo Camargo:

An Ontological Approach to Computer System Security. 61-73 - Apostolos P. Fournaris:

Trust Ensuring Crisis Management Hardware Module. 74-83 - S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat:

Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field GF(2m) and Their Properties. 84-94
- Aaron D. Sanders:

Conficker: Lessons in Secure Software and System Design. 95-99 - Sean Price:

A Heuristic Search for Identifying Required Application Libraries Supporting a Run-Time Security Policy. 100-108
Volume 19, Number 3, 2010
- Greg Gogolin, James Jones:

Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business. 109-117 - David R. Matthews:

eDiscovery versus Computer Forensics. 118-123 - Gavin Wylie Manes, Elizabeth Downing:

What Security Professionals Need to Know About Digital Evidence. 124-131
- Constantine Gikas:

A General Comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS Standards. 132-141 - Anand Gupta

, Shyam K. Gupta, Isha Manu Ganesh, Pankhuri Gupta, Vikram Goyal, Sangeeta Sabharwal:
Opaqueness Characteristic of a Context Honeypot System. 142-152 - Irene E. Edge:

Employ Five Fundamental Principles to Produce a SOLID, Secure Network. 153-159 - Xi Li:

How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations for Every Language in NP. 160-174
Volume 19, Number 4, 2010
- Durgesh Kumar Mishra

, Manohar Chandwani:
A Secured MultiParty Computational Protocol to Protect Cyber Space. 175-181 - Seung S. Yang, Hongsik Choi, Hankyu Joo:

Vulnerability Analysis of the Grid Data Security Authentication System. 182-190 - Ankur Gupta

, Lalit Kumar Awasthi
:
A Containment-Based Security Model for Cycle-Stealing P2P Applications. 191-203 - Siva S. Sivatha Sindhu, Arputharaj Kannan

:
Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm. 204-212 - V. Vijayaraghavan, Sanjoy Kumar Paul, Rajarathnam Nallusamy:

iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts. 213-225 - Virgil Mocanu:

Requirements for Security Enhancements to Legacy Software with RUP. 226-236
Volume 19, Number 5, 2010
- Jin Peng, Xin Zhao:

SSH-Based Device Identity and Trust Initialization. 237-242 - Lo'ai Ali Tawalbeh

, Saadeh Z. Sweidan:
Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm. 243-252 - Wendy W. Ting, David R. Comings:

Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework. 253-262 - S. A. Arunmozhi, Y. Venkataramani:

A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks. 263-272 - Jyotsna Singh, Parul Garg, Alok Nath De:

Data Hiding in Audio Using Random Orthogonal Matrices. 273-281 - John Mark Chasser:

Security Concerns in IPv6 and Transition Networks. 282-293
Volume 19, Number 6, 2010
- Enuma Orakwue:

Private Clouds: Secure Managed Services. 295-298 - Klaus Julisch, Michael Hall:

Security and Control in the Cloud. 299-309 - Rhonda Farrell:

Securing the Cloud - Governance, Risk, and Compliance Issues Reign Supreme. 310-319
- Fernando Roda

, Luis Lara:
Chaotic Cipher Using the Duffing Equation. 320-327 - Vinay Kumar, Sunil Kumar Muttoo:

Graph Theoretic Approach to Steganography to Secure Message Digest. 328-335 - Jonathan Hanny:

Building an Application Security Program. 336-342 - Satyanandan B. Atyam:

Effectiveness of Security Control Risk Assessments for Enterprises: Assess on the Business Perspective of Security Risks. 343-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














