ISSN : 1796-217X
Volume : 2    Issue : 6    Date : December 2007

Article Information

Influence Control for Dynamic Reconfiguration of Data Flow Systems
Wei Li and Zhikun Zhao
Page(s): 1-13
Abstract  |  Full Text: PDF (750 KB)

Anomaly Detection Using System Call Sequence Sets
Surekha Mariam Varghese and K.Poulose Jacob
Page(s): 14-21
Abstract  |  Full Text: PDF (305 KB)

Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
Dil Muhammad Akbar Hussain
Page(s): 22-29
Abstract  |  Full Text: PDF (583 KB)

A Decision Support System base line Flexible Architecture to Intrusion Detection
Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Mirko Minardi, Pierpaolo Catalano, Vito
Dicensi, and Gianfranco Tarricone
Page(s): 30-41
Abstract  |  Full Text: PDF (470 KB)

Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
Veselina G. Jecheva and  Evgeniya P. Nikolova
Page(s): 42-52
Abstract  |  Full Text: PDF (580 KB)

Using Aspect Programming to Secure Web Applications
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, and Laurence Duchien
Page(s): 53-63
Abstract  |  Full Text: PDF (1,183 KB)

Fine-Grained and Scalable Message Protection in Sensitive Organizations
Joon S. Park and Ganesh Devarajan
Page(s): 64-75
Abstract  |  Full Text: PDF (1,478 KB)

On Remote and Virtual Experiments in eLearning
Sabina Jeschke, Harald Scheel, Thomas Richter, and Christian Thomsen
Page(s): 76-85
Abstract  |  Full Text: PDF (569 KB)

In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games
Alexander Höhfeld
Page(s): 86-92
Abstract  |  Full Text: PDF (605 KB)