default search action
Information Security Technical Report, Volume 16
Volume 16, Number 1, February 2011
- Stephen D. Wolthusen:
Next generation networks. 1-2 - Serap Atay, Marcelo Masera:
Challenges for the security analysis of Next Generation Networks. 3-11 - Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, Olivier Festor:
A survey on fraud and service misuse in voice over IP (VoIP) networks. 12-19 - Claudio Mazzariello, Paolo De Lutiis, Dario Lombardo:
Clustering NGN user behavior for anomaly detection. 20-28 - Ge Zhang, Yacine Rebahi:
Side effects of identity management in SIP VoIP environment. 29-35
Volume 16, Number 2, May 2011
- Paul A. Watters:
Social networking threats. 37 - George R. S. Weir, Fergus Toolan, Duncan N. Smeed:
The threats of social networking: Old wine in new bottles? 38-43 - Ethel Quayle, Max Taylor:
Social networking as a nexus for engagement and exploitation of young people. 44-50 - Mofakharul Islam, Paul Andrew Watters, John Yearwood:
Real-time detection of children's skin on social networking sites using Markov random field modelling. 51-58 - Gaurav Gupta, Josef Pieprzyk, Len Hamey:
Bucket attack on numeric set watermarking model and safeguards. 59-66 - Gaurav Gupta, Josef Pieprzyk:
Socio-technological phishing prevention. 67-73 - Man Qi, Denis Edgar-Nevill:
Social networking searching and privacy issues. 74-78 - Paul Andrew Watters, Robert Layton, Richard Dazeley:
How much material on BitTorrent is infringing content? A case study. 79-87
Volume 16, Numbers 3-4, August - November 2011
- Paul G. Dorey, Armando Leite:
Commentary: Cloud computing - A security problem or solution? 89-96 - Piers Wilson:
Positive perspectives on cloud security. 97-101 - David Teneyuca:
Internet cloud security: The illusion of inclusion. 102-107 - Imad M. Abbadi, Andrew P. Martin:
Trust in the Cloud. 108-114 - Lizzie Coles-Kemp, Joseph Reddington, Patricia A. H. Williams:
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud. 115-122 - Zaheer Ahmad, Keith Mayes, Song Dong, Konstantinos Markantonakis:
Considerations for mobile authentication in the Cloud. 123-130 - Ulrich Lang, Rudolf Schreiner:
Analysis of recommended cloud security controls to validate OpenPMF "policy as a service". 131-141 - André van Cleeff, Wolter Pieters, Roel J. Wieringa, Frits van Tiel:
Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. 142-149
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.