Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 18

Content of Issue 6
DOI: 10.3217/jucs-018-06
Security in Information Systems: New Challenges and Opportunities D.G. Rosado, L.E. Sánchez, E. Fernández-Medina, J. Jürjens 728
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations H. Holm, T. Sommestad, U. Franke, M. Ekstedt 732
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems I. Vural, H.S. Venter 750
Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services P. Charuenporn, S. Intakosum 775
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment O. Rebollo, D. Mellado, E. Fernández-Medina 798
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management R. Matulevičius, H. Mouratidis, N. Mayer, E. Dubois, P. Heymans 816
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks C.-L. Botha, E. Kritzinger, M. Loock 845
Countermeasures to Prevent Misbehaviour in VANETs J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil 857
Adaptive Group Key Management Protocol for Wireless Communications S. Gharout, A. Bouabdallah, Y. Challal, M. Achemlal 874