The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2005, volume: 3, number: 6

  1. Carl E. Landwehr
    Green Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:3- [Journal]

  2. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:5- [Journal]
  3. Martin Libicki
    Are RFIDs Coming to Get You? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:6- [Journal]
  4. Heather Drinan, Nancy Fontaine, Brent Kesler
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:7-8 [Journal]
  5. Laurianne McLaughlin
    Winning the Game of Risk: Neumann's Take on Sound Design. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:9-12 [Journal]
  6. Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze
    Signaling Vulnerabilities in Wiretapping Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:13-25 [Journal]
  7. Susan Landau
    Security, Wiretapping, and the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:26-33 [Journal]
  8. Philip L. Campbell
    The Denial-of-Service Dance. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:34-40 [Journal]
  9. Stelios Sidiroglou, Angelos D. Keromytis
    Countering Network Worms Through Automatic Patch Generation. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:41-49 [Journal]
  10. Gregory J. Conti, Mustaque Ahamad
    A Framework for Countering Denial-of-Information Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:50-56 [Journal]
  11. Faith M. Heikkila
    SecureWorld Expo 2005. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:57-60 [Journal]
  12. Pinny Sheoran, Oris Friesen, Barbara J. Huffman de Belón
    Developing and Sustaining Information Assurance: The Role of Community Colleges (Part 1). [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:61-63 [Journal]
  13. Scott Borg
    Economically Complex Cyberattacks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:64-67 [Journal]
  14. Gerald A. Marin
    Network Security Basics. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:68-72 [Journal]
  15. Sean W. Smith
    Pretending that Systems Are Secure. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:73-76 [Journal]
  16. E. Michael Power, Roland L. Trope
    Acting Responsibly with Geospatial Data. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:77-80 [Journal]
  17. Katrina Tsipenyuk, Brian Chess, Gary McGraw
    Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:81-84 [Journal]
  18. Ted S. Phillips, Tom Karygiannis, Rick Huhn
    Security Standards for the RFID Market. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:85-89 [Journal]
  19. Bruce Schneier
    The Zotob Storm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:96- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002