Journal of Information Assurance and Security

Volume 7, Issue 1, 2012

  Page no.
   
1 Software Vulnerabilities by Example: A Fresh Look at the Buffer Overflow Problem - Bypassing SafeSEH
1
William B. Kimball, and Saverio Perugini
 
   
1Using Machine Learning Algorithms to Detect Content-based Arabic Web Spam
14
Heider Wahsheh , Iyad Abu Doush , Mohammed Al-Kabi , Izzat Alsmadi , and Emad Al-Shawakfa  
   
   
1 Detecting Temporal Inconsistency in Virtual Machine Activity Timelines
24
Sean Thorpe, Indrajit Ray
 
   
1User Data Confidentiality in an Orchestration of Web Services
32
Thomas Demongeot, Eric Totel, Valerie Viet Triem Tong and Yves Le Traon  
   
   
1 On the Capacity of Fingerprinting Codes against AND, Averaging, and Related Attacks
41
Gou Hosoya, Hideki Yagi, Manabu Kobayashi, and Shigeichi Hirasawa
 
   
1AES: Current Security and Efficiency Analysis of its Alternatives
52
Herman Isa, Iskandar Bahari and Muhammad Reza Z'aba  
   
   
   

Copyright ©2005 - 2012, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.