


default search action
Network Security, Volume 2011
Volume 2011, Number 1, January 2011
- Steve Mansfield-Devine:

Anonymous: serious threat or mere annoyance? 4-10 - Edward Amoroso:

Cyber attacks: awareness. 10-16 - Steve Gold:

Advanced evasion techniques. 16-19
Volume 2011, Number 2, February 2011
- Steve Durbin:

Information security without boundaries. 4-8 - Danny Bradbury:

Hacking wifi the easy way. 9-12 - Steve Gold:

The future of the firewall. 13-15 - David Ting:

Thinking thin: addressing the challenges of client computing. 16-17 - Michael Hamelin:

Preparing for a firewall audit. 18-19
Volume 2011, Number 3, March 2011
- Mark John Taylor, John Haggerty, David Gresty, David J. Lamb:

Forensic investigation of cloud computing systems. 4-10 - Russell Sanderson:

A secure data protection strategy. 10-12 - Shadi A. Aljawarneh

:
A web engineering security methodology for e-learning systems. 12-15 - Steve Gold:

IPv6 migration and security. 15-18 - Alexei Lesnykh:

Data loss prevention: a matter of discipline. 18-19
Volume 2011, Number 4, April 2011
- Tracey Caldwell:

Smart security. 5-9 - Andy Kemshall:

Why mobile two-factor authentication makes sense. 9-12 - Steve Gold:

Cracking GSM. 12-15 - Richard Blandford:

Information security in the cloud. 15-17 - Steve Jenkins:

Learning to love SIEM. 18-19
Volume 2011, Number 5, May 2011
- Danny Bradbury:

Routing around censorship. 5-8 - Aditya K. Sood, Richard J. Enbody:

Spying on the browser: dissecting the design of malicious extensions. 8-12 - Steve Gold:

Taking down botnets. 13-15 - Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian, Kent E. Seamons

:
DataVault: secure mobile access and data sharing. 16-19
Volume 2011, Number 6, June 2011
- Steve Durbin:

Tackling converged threats: building a security-positive environment. 5-8 - Tracey Caldwell:

When worlds collide: the security of converged networks. 8-12 - Jeff Hudson:

Weaponised malware: how criminals use digital certificates to cripple your organisation. 12-14 - Steve Gold:

The rebirth of phreaking. 15-17 - Marc Hocking:

Thin client security in the cloud. 17-19
Volume 2011, Number 7, July 2011
- Steve Gold:

Terrorism and Bluetooth. 5-7 - Will Gragido:

Beyond zero: analysing threat trends. 7-9 - Tracey Caldwell:

Ethical hackers: putting on the white hat. 10-13 - R. Sreeram Sreenivas, R. Anitha:

Detecting keyloggers based on traffic analysis with periodic behaviour. 14-19
Volume 2011, Number 8, August 2011
- Steve Mansfield-Devine:

Hacktivism: assessing the damage. 5-13 - Avi Turiel:

IPv6: new technology, new threats. 13-15 - Colin Tankard:

Advanced Persistent threats and how to monitor and deter them. 16-19
Volume 2011, Number 9, September 2011
- Steve Gold:

Cracking cellular networks via femtocells. 5-8 - Cath Everett:

Printers: the neglected threat. 8-11 - Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian:

Protecting personal data from untrusted web-based data services. 11-16 - Alex de Joode:

Effective corporate security and cybercrime. 16-18 - Graeme Creasey:

Protecting the datacentre. 18-19
Volume 2011, Number 10, October 2011
- Steve Gold:

Android insecurity. 5-7 - Aditya K. Sood, Richard J. Enbody:

Frametrapping the framebusting defence. 8-12 - James Harris:

Defending the network several times over. 12-14 - Rohan Nanda

, P. Venkata Krishna
:
Mitigating denial of service attacks in hierarchical wireless sensor networks. 14-18 - Richard Morrell, Akash Chandrashekar:

Cloud computing: new challenges and opportunities. 18-19
Volume 2011, Number 11, November 2011
- Frank Andrus:

Beyond scan and block: an adaptive approach to network access control. 5-9 - Gordon Thomson:

APTs: a poorly understood challenge. 9-11 - Klaus Gheri:

The benefits of application detection. 12-14 - Steve Gold:

Cracking wireless networks. 14-18 - Stuart Facey:

Who's in control: a six-step strategy for secure IT. 18-20
Volume 2011, Number 12, December 2011
- Steve Mansfield-Devine:

DDoS: threats and mitigation. 5-12 - Jérémy D'Hoinne:

Could 'wait and see' be the best IPv6 strategy? 12-14 - Steve Gold:

Understanding the hacker psyche. 15-17 - Florian Malecki:

A deeper, broader look at network security. 18-19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














