Journal of Information Assurance and Security
Volume 7, Issue 1, 2012
|
Page
no. |
|
|
Software Vulnerabilities by Example:
A Fresh Look at the Buffer Overflow Problem - Bypassing SafeSEH |
1 |
William B. Kimball, and Saverio Perugini |
|
|
|
Using Machine Learning Algorithms to Detect
Content-based Arabic Web Spam |
14 |
Heider Wahsheh
, Iyad Abu Doush
, Mohammed Al-Kabi
, Izzat Alsmadi
, and Emad Al-Shawakfa |
|
|
|
|
|
Detecting Temporal Inconsistency in Virtual
Machine Activity Timelines |
24 |
Sean Thorpe, Indrajit Ray |
|
|
|
User Data Confidentiality in an Orchestration of Web Services
|
32 |
Thomas Demongeot, Eric Totel, Valerie Viet Triem Tong and Yves Le Traon
|
|
|
|
|
|
On the Capacity of Fingerprinting Codes against AND, Averaging, and Related Attacks
|
41 |
Gou Hosoya, Hideki Yagi, Manabu Kobayashi, and Shigeichi Hirasawa
|
|
|
|
AES: Current Security and Efficiency Analysis of its Alternatives |
52 |
Herman Isa, Iskandar Bahari and Muhammad Reza Z'aba |
|
|
|
|
|
|
|
Copyright ©2005 -
2012, Dynamic Publishers Inc., USA
No part of Journal of
Information Assurance and Security may be reproduced or transmitted in any
form or by any means without written permission from the publisher.
Journal of Information Assurance and Security has been registered with the
Copyright Clearance Center (CCC) Transactional Reporting Services. Consent
is given for coping of articles for personal or internal use, or for the
personal use of specific clients provided that the base fee $05.00 (per
copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA
01970, USA. For those organizations that have been granted a photo copy
license by CCC, a separate system of payment has been arranged. The fee
code for users of the Transactional Reporting Service is 1060 5369/93
$03.50. |