All Stories

  1. Using response action with intelligent intrusion detection and prevention system against web application malware
  2. Skype Traffic Classification Using Cost Sensitive Algorithms
  3. Malicious Spam Emails Developments and Authorship Attribution
  4. Performance evaluation of e-government services using balanced scorecard
  5. Crime Toolkits: The Productisation of Cybercrime
  6. Organizations and Cybercrime
  7. Crime in Cyberspace: Offenders and the Role of Organized Crime Groups
  8. Detecting malicious behaviour using supervised learning algorithms of the function calls
  9. Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware
  10. Malware Detection and Prevention System Based on Multi-Stage Rules
  11. Using feature selection for intrusion detection system
  12. Malicious Code Detection Using Penalized Splines on OPcode Frequency
  13. Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
  14. Analysis of Malicious and Benign Android Applications
  15. Six Sigma Approach to Improve Quality in E-Services
  16. Cybercrime: The Case of Obfuscated Malware
  17. Towards an understanding of the impact of advertising on data leaks
  18. Analysis of firewall log-based detection scenarios for evidence in digital forensics
  19. GOM: New genetic optimizing model for broadcasting tree in MANET
  20. Towards Understanding Malware Behaviour by the Extraction of API Calls
  21. Stochastic Model Based Approach for Biometric Identification
  22. Towards Automatic Image Segmentation Using Optimised Region Growing Technique
  23. Information Security Governance
  24. Quality Approaches for Performance Measurement in Jordanian E-Government Services
  25. Trends in Crime Toolkit Development
  26. Web Malware that Targets Web Applications