JOURNAL OF SOFTWARE (JSW)
ISSN : 1796-217X
Volume : 2    Issue : 6    Date : December 2007

Article Information


Influence Control for Dynamic Reconfiguration of Data Flow Systems
Wei Li and Zhikun Zhao
Page(s): 1-13
Abstract  |  Full Text: PDF (750 KB)


Anomaly Detection Using System Call Sequence Sets
Surekha Mariam Varghese and K.Poulose Jacob
Page(s): 14-21
Abstract  |  Full Text: PDF (305 KB)


Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
Dil Muhammad Akbar Hussain
Page(s): 22-29
Abstract  |  Full Text: PDF (583 KB)


A Decision Support System base line Flexible Architecture to Intrusion Detection
Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Mirko Minardi, Pierpaolo Catalano, Vito
Dicensi, and Gianfranco Tarricone
Page(s): 30-41
Abstract  |  Full Text: PDF (470 KB)


Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
Veselina G. Jecheva and  Evgeniya P. Nikolova
Page(s): 42-52
Abstract  |  Full Text: PDF (580 KB)


Using Aspect Programming to Secure Web Applications
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, and Laurence Duchien
Page(s): 53-63
Abstract  |  Full Text: PDF (1,183 KB)


Fine-Grained and Scalable Message Protection in Sensitive Organizations
Joon S. Park and Ganesh Devarajan
Page(s): 64-75
Abstract  |  Full Text: PDF (1,478 KB)


On Remote and Virtual Experiments in eLearning
Sabina Jeschke, Harald Scheel, Thomas Richter, and Christian Thomsen
Page(s): 76-85
Abstract  |  Full Text: PDF (569 KB)


In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games
Alexander Höhfeld
Page(s): 86-92
Abstract  |  Full Text: PDF (605 KB)