The SCEAS System
Navigation Menu

Conferences in DBLP

(issa)
2008 (conf/issa/2008)


  1. The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research. [Citation Graph (, )][DBLP]


  2. Application of Message Digests for the Verification of Logical Forensic Data. [Citation Graph (, )][DBLP]


  3. A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code. [Citation Graph (, )][DBLP]


  4. The Use of File Timestamps in Digital Forensics. [Citation Graph (, )][DBLP]


  5. Spam Construction Trends. [Citation Graph (, )][DBLP]


  6. Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania. [Citation Graph (, )][DBLP]


  7. Bloom's Taxonomy for Information Security Education. [Citation Graph (, )][DBLP]


  8. An Introduction to Standards related to Information Security. [Citation Graph (, )][DBLP]


  9. The Principle of Security Safeguards: Accidental Activities. [Citation Graph (, )][DBLP]


  10. A Novel Security Metrics Taxonomy for R&D Organisations. [Citation Graph (, )][DBLP]


  11. Spam Over Internet Telephony and How to Deal with it. [Citation Graph (, )][DBLP]


  12. A User Centric Model for Online Identity and Access Management. [Citation Graph (, )][DBLP]


  13. Collective Improvisation: Complementing Information Security Frameworks with Self-Policing. [Citation Graph (, )][DBLP]


  14. The Information Security of a Bluetooth-Enabled Handheld Device. [Citation Graph (, )][DBLP]


  15. Immune System Based Intrusion Detection System. [Citation Graph (, )][DBLP]


  16. Towards a Framework for a Network Warfare Capability. [Citation Graph (, )][DBLP]


  17. UML Modelling of Digital Forensic Process Models (DFPMs). [Citation Graph (, )][DBLP]


  18. The IP Protection of Electronic Databases: Copyright or Copywrong? [Citation Graph (, )][DBLP]


  19. A Proof-of-Concept Implementation of EAP-TLS with TPM Support. [Citation Graph (, )][DBLP]


  20. Computer Monitoring in the 21st Century Workplace. [Citation Graph (, )][DBLP]


  21. Emerging Framework for The Evaluation of Open Source Security Tools. [Citation Graph (, )][DBLP]


  22. Password Management: Empirical Results from a RSA and USA Study. [Citation Graph (, )][DBLP]


  23. No Age Discrimination for Biometrics. [Citation Graph (, )][DBLP]


  24. Social Aspects of Information Security. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002