default search action
International Journal of Electronic Security and Digital Forensics, Volume 1
Volume 1, Number 1, 2007
- Hamid Jahankhani:
Evaluation of cyber legislations: trading in the global cyber village. 1-11 - Ivan Flechais, Cecilia Mascolo, Martina Angela Sasse:
Integrating security and usability into the requirements and design process. 12-26 - Haralambos Mouratidis:
Secure information systems engineering: a manifesto. 27-41 - Murdoch Watney:
State surveillance of the internet: human rights infringement or e-security mechanism? 42-54 - Kenneth Revett, Florin Gorunescu, Marina Gorunescu, Marius Ene, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos:
A machine learning approach to keystroke dynamics based user authentication. 55-70 - David Lilburn Watson:
Stealing corporate secrets using open source intelligence (the practitioner's view). 71-75 - Olga Angelopoulou, Paula Thomas, Konstantinos Xynos, Theodore Tryfonas:
Online ID theft techniques, investigation and response. 76-88 - Vebjørn Moen, André N. Klingsheim, Kent Inge Fagerland Simonsen, Kjell Jørgen Hole:
Vulnerabilities in e-governments. 89-100 - Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Roberts:
Rule generalisation in intrusion detection systems using SNORT. 101-116 - Syed Ahsan:
IT enabled counter terrorism infrastructure: issues and challenges. 117-124
Volume 1, Number 2, 2007
- Aminata Taal:
Report examining the weaknesses in the fight against cyber-crime from within. 125-130 - Subramanian Appavu, Ramasamy Rajaram:
Detection of e-mail concerning criminal activities using association rule-based decision tree. 131-145 - Mohammed Assora, James Kadirire, Ayoub Shirvani:
A web transaction security scheme based on disposable credit card numbers. 146-155 - Daniel Bilar:
Opcodes as predictor for malware. 156-168 - Elias Pimenidis, Ioannis Savvas:
E-identification technologies for e-government interoperability in the EU. 169-179 - William K. Geissler, John C. McEachen:
Exploiting error control in network traffic for robust, high rate covert channels. 180-193 - Colin Pattinson, Kemal Hajdarevic:
Timing considerations in detecting resource starvation attacks using statistical profiles. 194-205 - Konstantinos Kardaras, Zacharias Kamarianakis, Andrew Chanerley, Dimitris Koutsouris:
Unauthorised person recognition using gait biometry and information analysis: integration and transparency of security operations in a centralised intelligence environment. 206-217 - Vasilios Zorkadis:
Detection and surveillance technologies: privacy-related requirements and protection schemes. 218-231
Volume 1, Number 3, 2008
- Amin Mousavi, Elias Pimenidis, Hamid Jahankhani:
Cultivating trust - an electronic-government development model for addressing the needs of developing countries. 233-248 - Christos K. Georgiadis, Dimitrios A. Baltatzis, George Pangalos:
Secure mobile agent environments: modelling role assignments. 249-267 - Samia Boucherkha, Mohamed Benmohamed:
Textural features extraction for image integrity verification. 268-280 - Roman V. Yampolskiy:
Action-based user authentication. 281-300 - William C. Suski, Michael A. Temple, Michael J. Mendenhall, Robert F. Mills:
Radio frequency fingerprinting commercial communication devices to enhance electronic security. 301-322
Volume 1, Number 4, 2008
- Wai Chee Yau, Dinesh Kant Kumar, Hans Weghorn:
Vision-based technique for secure recognition of voice-less commands. 323-335 - Katerina Papadaki, Despina Polemi:
A meta-process for information security risk management. 336-343 - Mehreen Afzal, Ashraf Masood:
Algebraic analysis of Trivium and Trivium/128. 344-352 - Man Qi, Denis Edgar-Nevill, Yongquan Wang, Rongsheng Xu:
Tracking online trails. 353-361 - Yi Dai, Jinshu Su, Ying Zhang:
A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch. 362-373 - Susan Burns, George R. S. Weir:
Varieties of smartcard fraud. 374-386 - Cyril Onwubiko:
Multisensor message exchange mechanism. 387-400 - Manish Kumar, M. Hanumanthappa, Bhavanam Lakshma Reddy:
Security issues in m-government. 401-412 - Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
Another security improvement over the Lin et al.'s electronic-voting scheme. 413-422 - Hossein Jahankani, Branko Antonijevic, Terry Hugh Walcott:
Tools protecting stakeholders against hackers and crackers: an insight review. 423-429
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.