The SCEAS System
Navigation Menu

Conferences in DBLP

(aism)
2005 (conf/aism/2005)

  1. Marwan Al-Zarouni
    Taxonomy of WRT54G(S) Hardware and Custom Firmware. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:1-10 [Conf]
  2. Martin Dart
    Seeking information superiority: strategies for business in the commercial application of information operations. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:11-19 [Conf]
  3. Rosanna Fanciulli
    An investigation into the paradox of organisational flexibility versus security: A research project overview. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:20-26 [Conf]
  4. Lennon Hopkins
    Identity Synthesis: Creating An Identity From Scratch. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:27-32 [Conf]
  5. William Hutchinson
    Information Security: a Misnomer. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:33-37 [Conf]
  6. Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac
    Smart Card Authentication for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:38-46 [Conf]
  7. K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, A. Ahmad
    Security Governance: Its Impact on Security Culture. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:47-58 [Conf]
  8. Yi-Chi Lin, Jill Slay
    Non-Repudiation in Pure Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:59-66 [Conf]
  9. Leanne Ngo, Wanlei Zhou, Matthew Warren
    Understanding Transition towards Information Security Culture Change. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:67-73 [Conf]
  10. Aaron Olding, Paul Turner
    My Problem or Our Problem? - Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of 'Malicious Targeted Attacks'. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:74-79 [Conf]
  11. Graeme Pye, Matthew J. Warren
    Benchmarking E-business Security: A Model and Framework. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:80-87 [Conf]
  12. Reijo Savola
    Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:88-94 [Conf]
  13. Mahdi Seify
    Risk Management in CRM Security Management. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:95-102 [Conf]
  14. Zhiqi Tao, Anthonie B. Ruighaver
    Detecting Rogue Access Points that endanger the Maginot Line of Wireless Authentication. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:103-110 [Conf]
  15. Patricia A. H. Williams
    Physician secure thyself. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:111-116 [Conf]
  16. Patricia A. H. Williams
    The underestimation of threats to patient data in clinical practice. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:117-122 [Conf]
  17. Lih Wern Wong
    Potential Bluetooth Vulnerabilities in Smartphones. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:123-132 [Conf]
  18. Andrew Woodward
    Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:133-140 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002