Volume 31, Number 1, February 2012
M. Oguzhan Külekci
: On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression.
: Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.
Volume 31, Number 2, March 2012
: Performance of automated network vulnerability scanning at remediating security issues.
: Security Risk Management: Building an Information Security Risk Management Program from the Ground Up.
Volume 31, Number 3, May 2012
: Applying security policies and service level agreement to IaaS service model to enhance security and transition.
: Evaluating a migration-based response to DoS attacks in a system of distributed auctions.
Volume 31, Number 4, June 2012
Muhammed Naeem Ahmed Khan
: Performance analysis of Bayesian networks and neural networks in classification of file system activities.
: QoP-ML: Quality of protection modelling language for cryptographic protocols.
: Securing the Cloud: Cloud Computer Security Techniques and Tactics.
: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice.
William J. Caelli
: Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners.
Volume 31, Number 5, July 2012
, Kemal Bicakci
: A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset.
Volume 31, Number 6, September 2012
: The Basics of Digital Forensics.
Volume 31, Number 7, October 2012
Volume 31, Number 8, November 2012
: Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges.