Journal cover image

Browse issues


Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Information and Computer Security

2008 Vol. 2 No. 2

 

PagesTitle and authors
107-139Unsupervised anomaly detection using an evolutionary extension of k-means algorithm
Wei Lu, Issa Traore
DOI: 10.1504/IJICS.2008.018513

140-174On security issues in embedded systems: challenges and solutions
Lyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache
DOI: 10.1504/IJICS.2008.018515

175-196CVC-STAR: Protecting data confidentiality while increasing flexibility and quality of responses
Daniel O. Rice, Robert Garfinkel, Ram Gopal
DOI: 10.1504/IJICS.2008.018517

197-217Attack recovery from malicious transactions in distributed database systems
A. Chakraborty, M.K. Garg, A.K. Majumdar, S. Sural
DOI: 10.1504/IJICS.2008.018519

218-234Genetic-clustering algorithm for intrusion detection system
Chien-Chuan Lin, Ming-Shi Wang
DOI: 10.1504/IJICS.2008.018521