The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2003, volume: 1, number: 5

  1. Carl E. Landwehr
    From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:5- [Journal]

  2. Security and Privacy Welcomes New Editorial Board Members. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:6-7 [Journal]
  3. Greg Goth, Sandra Kay Miller
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:8-11 [Journal]
  4. Scott L. Andresen
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:12-13 [Journal]

  5. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:14- [Journal]
  6. Robert J. Campbell
    Crime Scene Investigators: The Next Generation. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:15- [Journal]
  7. Dennis McGrath
    Measuring the 4: 11 Effect: The Power Failure and the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:16-18 [Journal]
  8. Massoud Amin
    North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:19-25 [Journal]
  9. Peter G. Capek, David M. Chess, Steve R. White
    Merry Christma: An Early Network Worm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:26-34 [Journal]
  10. Hilarie K. Orman
    The Morris Worm: A Fifteen-Year Perspective. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:35-43 [Journal]
  11. Rolf Oppliger, Ruedi Rytz
    Digital Evidence: Dream and Reality. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:44-48 [Journal]
  12. Salim Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, Cauligi S. Raghavendra
    Impact Analysis of Faults and Attacks in Large-Scale Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:49-54 [Journal]
  13. Fred B. Schneider
    Least Privilege and More. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:55-59 [Journal]
  14. John Lenarcic
    The Dinosaur and the Butterfly: A Tale of Computer Ethics. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:61-63 [Journal]
  15. Daniel Ragsdale, Donald Welch, Ronald Dodge
    Information Assurance the West Point Way. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:64-67 [Journal]
  16. Nancy R. Mead
    SEHAS 2003: The Future of High-Assurance Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:68-72 [Journal]
  17. Michael Lesk
    Chicken Little and the Recorded Music Crisis. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:73-75 [Journal]
  18. Jim Hearn
    What Works? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:76-77 [Journal]
  19. Ivan Arce
    The Rise of the Gadgets. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:78-81 [Journal]
  20. Jean Camp
    Access Denied. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:82-85 [Journal]
  21. Martin R. Stytz, James A. Whittaker
    Caution: This Product Contains Security Code. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:86-88 [Journal]
  22. Bill McCarty
    Automated Identity Theft. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:89-92 [Journal]
  23. Michael A. Caloyannides
    Keeping Offline Computer Usage Private. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:93-95 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002