Table of contents
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups
Sigi GoodeSoftware piracy is an ongoing problem for software producers. At the same time, mobile devices such as personal digital assistants and smart phones are increasing in popularity…
2232
Information security governance in Saudi organizations: an empirical study
Ahmad Abu‐MusaThis paper seeks to empirically examine the existence and implementation of information security governance (ISG) in Saudi organizations.
4232
A survey of intrusion detection and prevention systems
Ahmed Patel, Qais Qassim, Christopher WillsThe problem of protecting information and data flows has existed from the very first day of information exchange. Various approaches have been devised to protect and transfer such…
5108
Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system
Dimitrios Patsos, Sarandis Mitropoulos, Christos DouligerisThe paper proposes looking at the automation of the incident response (IR) process, through formal, systematic and standardized methods for collection, normalization and…
948