


default search action
Information Security Journal: A Global Perspective, Volume 24
Volume 24, Numbers 1-3, 2015
- Gianluca Lax

, Francesco Buccafurri
, Gianluca Caminiti:
Digital Document Signing: Vulnerabilities and Solutions. 1-14 - Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri:

A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. 15-23 - Paul Rabinovich:

Towards Better AAA in Identity Federations. 24-30 - Christopher Cox:

Cyber Capabilities and Intent of Terrorist Forces. 31-38 - Huw Read

, Iain Sutherland
, Konstantinos Xynos
, Frode Roarson:
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems. 39-47 - Gregory Early, William Stott III:

Preemptive Security Through Information Analytics. 48-56 - Georgios Spanos

, Lefteris Angelis:
Impact Metrics of Security Vulnerabilities: Analysis and Weighing. 57-71 - Karina Korpela:

Improving Cyber Security Awareness and Training Programs with Data Analytics. 72-77
Volume 24, Numbers 4-6, 2015
- Shijie Zhou:

A Survey on Fast-flux Attacks. 79-97
- Nanta Janpitak, Chanboon Sathitwiriyawong:

Automated Compliance Checking Methodology for Non-Log Operations. 98-108 - S. Srisakthi, A. P. Shanthi:

Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment. 109-117 - Manas Ranjan Nayak

, Baidyanath Tudu, Abhishek Basu
, Subir Kumar Sarkar:
On the Implementation of a Secured Digital Watermarking Framework. 118-126
- Neamen Negash, Xiangdong Che:

An Overview of Modern Botnets. 127-132
- Adebukola Onashoga

, Olusola O. Abayomi-Alli
, Adesina S. Sodiya, David A. Ojo:
An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System. 133-145 - Primoz Cigoj, Borka Jerman Blazic:

An Authentication and Authorization Solution for a Multiplatform Cloud Environment. 146-156 - Eric J. Smith, Nina A. Kollars

:
QR Panopticism: User Behavior Triangulation and Barcode-Scanning Applications. 157-163 - Theodoros Spyridopoulos

, Konstantinos Maraslis, Alexios Mylonas
, Theo Tryfonas
, George C. Oikonomou
:
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. 164-176 - Richard G. Taylor:

Potential Problems with Information Security Risk Assessments. 177-184 - Nazmul Islam, Kazi Md. Rokibul Alam, Shaikh Shiam Rahman:

Commutative Re-encryption Techniques: Significance and Analysis. 185-193 - Su Zhang, Xinming Ou, Doina Caragea

:
Predicting Cyber Risks through National Vulnerability Database. 194-206 - Hussain Alsaiari, Maria Papadaki

, Paul Dowland
, Steven Furnell
:
Secure Graphical One Time Password (GOTPass): An Empirical Study. 207-220

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














