The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2005, volume: 3, number: 1

  1. Carl E. Landwehr
    Changing the Puzzle Pieces. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:3-4 [Journal]

  2. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:4- [Journal]
  3. Greg Goth
    Phishing Attacks Rising, But Dollar Losses Down. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:8- [Journal]
  4. Eric Goetz, Garrett Jones, Brent Kesler
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:9-10 [Journal]
  5. Martin R. Sytz
    Studying Attacks to Improve Software Defense. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:11- [Journal]
  6. Ross J. Anderson, Bruce Schneier
    Guest Editors' Introduction: Economics of Information Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:12-13 [Journal]
  7. Eric Rescorla
    Is Finding Security Holes a Good Idea? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:14-19 [Journal]
  8. Ashish Arora, Rahul Telang
    Economics of Software Vulnerability Disclosure. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:20-25 [Journal]
  9. Alessandro Acquisti, Jens Grossklags
    Privacy and Rationality in Individual Decision Making. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:26-33 [Journal]
  10. Hal R. Varian, Fredrik Wallenberg, Glenn Woroch
    The Demographics of the Do-Not-Call List. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:34-39 [Journal]
  11. Stuart E. Schechter
    Toward Econometric Models of the Security Risk from Remote Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:40-44 [Journal]
  12. George Danezis, Ross J. Anderson
    The Economics of Resisting Censorship. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:45-50 [Journal]
  13. John Linn
    Technology and Web User Data Privacy: A Survey of Risks and Countermeasures. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:52-58 [Journal]
  14. Alec Yasinsac, Mike Burmester
    Centers of Academic Excellence: A Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:62-65 [Journal]
  15. Herbert H. Thompson
    Application Penetration Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:66-69 [Journal]
  16. Ivan Arce
    Bad Peripherals. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:70-73 [Journal]
  17. Carlisle M. Adams
    Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:74-77 [Journal]
  18. Roland L. Trope
    Directors' Digital Fiduciary Duties. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:78-82 [Journal]
  19. Brad Arkin, Scott Stender, Gary McGraw
    Software Penetration Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:84-87 [Journal]
  20. Bruce Schneier
    Authentication and Expiration. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:88- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002