Content of Issue 6
DOI: 10.3217/jucs-018-06
|
Security in Information Systems: New Challenges and Opportunities |
D.G. Rosado, L.E. Sánchez, E. Fernández-Medina, J. Jürjens |
728 |
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations |
H. Holm, T. Sommestad, U. Franke, M. Ekstedt |
732 |
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems |
I. Vural, H.S. Venter |
750 |
Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services |
P. Charuenporn, S. Intakosum |
775 |
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment |
O. Rebollo, D. Mellado, E. Fernández-Medina |
798 |
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management |
R. Matulevičius, H. Mouratidis, N. Mayer, E. Dubois, P. Heymans |
816 |
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks |
C.-L. Botha, E. Kritzinger, M. Loock |
845 |
Countermeasures to Prevent Misbehaviour in VANETs |
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil |
857 |
Adaptive Group Key Management Protocol for Wireless Communications |
S. Gharout, A. Bouabdallah, Y. Challal, M. Achemlal |
874 |