Volume 27, Numbers 1-2, March 2008
, Ugo Fiore
: Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies.
Volume 27, Numbers 3-4, May-June 2008
: Efficient multi-server authentication scheme based on one-way hash function without verification table.
Volume 27, Numbers 5-6, October 2008
: Critical study of neural networks in detecting intrusions.
, Andy Podgurski
: Application-based anomaly intrusion detection with dynamic information flow analysis.
: Practical anonymous user authentication scheme with security proof.
, E. Smith
: Information security management: An information security retrieval and awareness model for industry.
Volume 27, Numbers 7-8, December 2008
Anthony J. Palmer
: Criteria to evaluate Automated Personal Identification Mechanisms.