International Journal of Information and Computer Security
2013 Vol.5 No.4
Pages | Title and author(s) |
251-274 | Extensible policy framework for heterogeneous network environmentsLawrence Teo; Gail-Joon Ahn DOI: 10.1504/IJICS.2013.058210 |
275-289 | Evaluation of severity index of vulnerability categoriesAnshu Tripathi; Umesh Kumar Singh DOI: 10.1504/IJICS.2013.058211 |
290-300 | A value transformation and random permutation-based coloured image encryption techniqueMahmood Al-Khassaweneh; Shefa Tawalbeh DOI: 10.1504/IJICS.2013.058212 |
301-333 | A social dimensional cyber threat model with formal concept analysis and fact-proposition inferenceAnup Sharma; Robin Gandhi; Qiuming Zhu; William R. Mahoney; William Sousan DOI: 10.1504/IJICS.2013.058213 |
334-358 | First passage time and first passage percolation models for analysing network resilience and effective strategies in strategic information warfare research: a brief survey and perspectiveZhanshan Ma DOI: 10.1504/IJICS.2013.058219 |