Table of Contents, vol 5, no 3&4, year 2012
pages: 68 - 80
Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems
Mehrdad Saadatmand, Mälardalen Real-Time Research Centre (MRTC), Mälardalen University, Sweden
Thomas Leveque, Orange Labs, Meylan, France
Antonio Cicchetti, Mälardalen Real-Time Research Centre (MRTC), Mälardalen University, Sweden
Mikael Sjödin, Mälardalen Real-Time Research Centre (MRTC), Mälardalen University, Sweden
pages: 81 - 93
Preventing Protocol Switching Covert Channels
Steffen Wendzel, University of Hagen; Augsburg University of Applied Sciences, Germany
Jörg Keller, University of Hagen, Germany
pages: 94 - 111
Securing Access to Data in Business Intelligence Domains
Ahmad Altamimi, Concordia University, Canada
Todd Eavis, Concordia University, Canada
pages: 112 - 120
Verification with AVISPA to Engineer Network Security Protocols
Florian Kammueller Florian Kammueller, Middlesex University London, UK
pages: 121 - 133
Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles
Mehmud Abliz, University of Pittsburgh, USA
Taieb Znati, University of Pittsburgh, USA
Adam Lee, University of Pittsburgh, USA
pages: 134 - 143
A Distributed Hash Table Assisted Intrusion Prevention System
Zoltán Czirkos, Budapest University of Technology and Economics, Department of Electron Devices, Hungary
Márta Rencz, Budapest University of Technology and Economics, Department of Electron Devices, Hungary
Gábor Hosszú, Budapest University of Technology and Economics, Department of Electron Devices, Hungary
download vol 5, no 3&4, year 2012