Journals in DBLP
Carl E. Landwehr From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:5- [Journal ] Security and Privacy Welcomes New Editorial Board Members. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:6-7 [Journal ] Greg Goth , Sandra Kay Miller News. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:8-11 [Journal ] Scott L. Andresen News Briefs. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:12-13 [Journal ] Letters to the Editor. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:14- [Journal ] Robert J. Campbell Crime Scene Investigators: The Next Generation. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:15- [Journal ] Dennis McGrath Measuring the 4: 11 Effect: The Power Failure and the Internet. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:16-18 [Journal ] Massoud Amin North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:19-25 [Journal ] Peter G. Capek , David M. Chess , Steve R. White Merry Christma: An Early Network Worm. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:26-34 [Journal ] Hilarie K. Orman The Morris Worm: A Fifteen-Year Perspective. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:35-43 [Journal ] Rolf Oppliger , Ruedi Rytz Digital Evidence: Dream and Reality. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:44-48 [Journal ] Salim Hariri , Guangzhi Qu , Tushneem Dharmagadda , Modukuri Ramkishore , Cauligi S. Raghavendra Impact Analysis of Faults and Attacks in Large-Scale Networks. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:49-54 [Journal ] Fred B. Schneider Least Privilege and More. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:55-59 [Journal ] John Lenarcic The Dinosaur and the Butterfly: A Tale of Computer Ethics. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:61-63 [Journal ] Daniel Ragsdale , Donald Welch , Ronald Dodge Information Assurance the West Point Way. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:64-67 [Journal ] Nancy R. Mead SEHAS 2003: The Future of High-Assurance Systems. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:68-72 [Journal ] Michael Lesk Chicken Little and the Recorded Music Crisis. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:73-75 [Journal ] Jim Hearn What Works? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:76-77 [Journal ] Ivan Arce The Rise of the Gadgets. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:78-81 [Journal ] Jean Camp Access Denied. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:82-85 [Journal ] Martin R. Stytz , James A. Whittaker Caution: This Product Contains Security Code. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:86-88 [Journal ] Bill McCarty Automated Identity Theft. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:89-92 [Journal ] Michael A. Caloyannides Keeping Offline Computer Usage Private. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:93-95 [Journal ]