Journals in DBLP
Carl E. Landwehr Changing the Puzzle Pieces. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:3-4 [Journal ] Letters to the Editor. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:4- [Journal ] Greg Goth Phishing Attacks Rising, But Dollar Losses Down. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:8- [Journal ] Eric Goetz , Garrett Jones , Brent Kesler News Briefs. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:9-10 [Journal ] Martin R. Sytz Studying Attacks to Improve Software Defense. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:11- [Journal ] Ross J. Anderson , Bruce Schneier Guest Editors' Introduction: Economics of Information Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:12-13 [Journal ] Eric Rescorla Is Finding Security Holes a Good Idea? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:14-19 [Journal ] Ashish Arora , Rahul Telang Economics of Software Vulnerability Disclosure. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:20-25 [Journal ] Alessandro Acquisti , Jens Grossklags Privacy and Rationality in Individual Decision Making. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:26-33 [Journal ] Hal R. Varian , Fredrik Wallenberg , Glenn Woroch The Demographics of the Do-Not-Call List. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:34-39 [Journal ] Stuart E. Schechter Toward Econometric Models of the Security Risk from Remote Attack. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:40-44 [Journal ] George Danezis , Ross J. Anderson The Economics of Resisting Censorship. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:45-50 [Journal ] John Linn Technology and Web User Data Privacy: A Survey of Risks and Countermeasures. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:52-58 [Journal ] Alec Yasinsac , Mike Burmester Centers of Academic Excellence: A Case Study. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:62-65 [Journal ] Herbert H. Thompson Application Penetration Testing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:66-69 [Journal ] Ivan Arce Bad Peripherals. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:70-73 [Journal ] Carlisle M. Adams Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:74-77 [Journal ] Roland L. Trope Directors' Digital Fiduciary Duties. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:78-82 [Journal ] Brad Arkin , Scott Stender , Gary McGraw Software Penetration Testing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:84-87 [Journal ] Bruce Schneier Authentication and Expiration. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:88- [Journal ]