


default search action
Information Security Journal: A Global Perspective, Volume 21
Volume 21, Number 1, 2012
- Mohammad Fraiwan, Rami Al-Salman, Natheer Khasawneh, Stefan Conrad

:
Analysis and Identification of Malicious JavaScript Code. 1-11 - Dimitrios A. Baltatzis, Christos Ilioudis

, George Pangalos:
A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments. 12-27 - Addepalli V. N. Krishna

:
An Improvised ECC Mechanism with Probabilistic Approach. 28-35 - Uloli Thiruvaazhi

, M. Edington Alex:
A Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack. 36-46 - Jason S. Burkett:

Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®. 47-54 - Mohamed Ibrahiem Amer, Tarek S. Sobh

, Gouda Ismail Mohamed:
Using Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS. 55-63
Volume 21, Number 2, 2012
- P. Mohan Kumar, K. L. Shunmuganathan

:
Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate. 65-70 - Kevin T. Smith:

Mitigating Risks Associated with Transitive Trust in Service-Based Identity Propagation. 71-78 - Kakali Chatterjee, Asok De

, Daya Gupta:
Timestamp-Based Digital Envelope for Secure Communication Using HECC. 79-87 - Roli Bansal

, Priti Sehgal, Punam Bedi
:
Securing Fingerprint Images Using PSO-Based Wavelet Domain Watermarking. 88-101 - Jian Hua, Sanjay Bapna:

How Can We Deter Cyber Terrorism? 102-114
Volume 21, Number 3, 2012
- Kenneth Earl Gumm Jr.:

Can Social Network Analysis be Effective at Improving the Intelligence Community While Ensuring Civil Rights? 115-126 - Douglas Warfield:

Critical Infrastructures: IT Security and Threats from Private Sector Ownership. 127-136 - Oluwasefunmi 'Tale Arogundade

, A. T. Akinwale, Zhi Jin, Xiaoguang Yang:
Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse. 137-149 - S. A. Arunmozhi, Y. Venkataramani:

Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network. 150-158 - David Bennett:

The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations. 159-168
Volume 21, Number 4, 2012
- Syed Akram

, Mohammed Misbahuddin
, G. Varaprasad:
A Usable and Secure Two-Factor Authentication Scheme. 169-182 - Sherali Zeadally, Byunggu Yu

, Dong Hyun Jeong
, Lily Rui Liang:
Detecting Insider Threats: Solutions and Trends. 183-192 - Ibrahim F. Elashry, Osama S. Faragallah

, Alaa M. Abbas
, S. El-Rabaie
, Fathi E. Abd El-Samie:
A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode. 193-205 - Gerardo Canfora

, Corrado Aaron Visaggio
:
Managing Trust in Social Networks. 206-215 - Timothy Godlove:

Examination of the Factors that Influence Teleworkers' Willingness to Comply with Information Security Guidelines. 216-229
Volume 21, Number 5, 2012
- Ismail San

, Nuray At:
Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs. 231-242 - T. N. Shankar, Gadadhar Sahoo

, S. Niranjan:
Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication. 243-255 - Lo'ai Ali Tawalbeh

, Omar Banimelhem
, Mohammed A. Al-Batati:
A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process. 256-268 - Henk-Jan van der Molen:

Forecasting Malware Conditions: Worsening Conditions, Some Bright Spots. 269-279 - Georgios Mamalakis

, Chariton Karamitas:
A Unified User Management System. 280-284 - Osama S. Faragallah

:
Quadruple Difference Expansion-Based Reversible Data Hiding Method for Digital Images. 285-295
Volume 21, Number 6, 2012
- Stefan G. Weber:

A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes. 297-305 - Osama Hayatle, Amr M. Youssef, Hadi Otrok

:
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies. 306-316 - Vinay Kumar, Abhishek Bansal

, Sunil Kumar Muttoo:
Hiding Information in Vector Layer While Extracting Layers from Raster Data. 317-327 - Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas:

How Effective Is Your Security Awareness Program? An Evaluation Methodology. 328-345 - Chandrapal Chahar, Vishal Singh Chauhan, Manik Lal Das:

Code Analysis for Software and System Security Using Open Source Tools. 346-352
- Abubakr Magzoub:

Privacy and Big Data, by Craig, T., and Ludloff, M. E.Sebastopol, CA: O'Reilly Media, 2011, 91p. $14.99. ISBN: 978-1-449-30500-0. 353-354 - Larry Marks:

Blackjacking: Security Threats to Blackberry Devices, PDAs and Cell Phones in the Enterprise, by Hoffman, Daniel V.New York: Wiley, 2007, 292p., $39.99.ISBN 978-0-470-12754-4. 355-356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














