To search, Click below search items.
All Published Papers Search Service
Title
The simple information security audit process: SISAP
Author
Bel G. Raggad, Emilio Collar
Vol. 6 No. 6 pp. 189-198
Keywords
Security audit, vulnerability assessment, threats, ISO 17799, nominal audit, risk assessment
Security Vulnerabilities and Solutions in Mobile WiMAX
Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka
Vol. 7 No. 11 pp. 7-15
IEEE 802.16e security, multi- and broadcast service, shared key vulnerability, hash chaining solution
MagicNET: The Human Immune System and Network Security System
Muhammad Awais Shibli, Jeffy Mwakalinga, Sead Muftic
Vol. 9 No. 1 pp. 87-94
Intrusion Detection, Intrusion Response, Vulnerability Analysis, Mobile Agents, Immune System, Intrusion Deterrence
Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network
Woo-Sung Chun, Dea-Woo Park
Vol. 9 No. 12 pp. 291-298
WiBro, Vulnerability, Forensic, Hacker Attack, DDoS