Journals in DBLP
George Cybenko Boiling Frogs? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:5- [Journal ] S&P Welcomes New Editorial Board Members. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:6-7 [Journal ] Laurianne McLaughlin , Rosemary Clandos News. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:8-11 [Journal ] Scott L. Andresen News Briefs. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:12-13 [Journal ] Martin R. Stytz Setting the Standard for Security Literature. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:14- [Journal ] Alec Yasinsac , Robert F. Erbacher , Donald G. Marks , Mark Pollitt , Peter M. Sommer Computer Forensics Education. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:15-23 [Journal ] Daniel Geer , Kevin Soo Hoo , Andrew Jaquith Information Security: Why the Future Belongs to the Quants. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:24-32 [Journal ] David Moore , Vern Paxson , Stefan Savage , Colleen Shannon , Stuart Staniford-Chen , Nicholas Weaver Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal ] Christian S. Collberg , Ginger Myles , Andrew Huntwork Sandmark--A Tool for Software Protection Research. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:40-49 [Journal ] Ting Yu , Marianne Winslett , Jason E. Holt Two Security Symposia. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:50-52 [Journal ] Bacon Ice Cream: The Best Mix of Proactive and Reactive Security? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:53-57 [Journal ] Elias Levy The Making of a Spam Zombie Army: Dissecting the Sobig Worms. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:58-59 [Journal ] Marc Donner The Girl with No Eyes. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:60-64 [Journal ] Barbara Endicott-Popovsky Ethics and Teaching Information Assurance. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:65-67 [Journal ] Bruce Potter Wireless Security's Future. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:68-72 [Journal ] Michael Lesk Making the Copyright Law Work. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:73-74 [Journal ] Jim Hearn Keeping Up Appearances. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:75-76 [Journal ] Dave Ahmad The Rising Threat of Vulnerabilities Due to Integer Errors. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:77-82 [Journal ] Herbert H. Thompson Why Security Testing Is Hard. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:83-86 [Journal ] Bill McCarty Botnets: Big and Bigger. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:87-90 [Journal ] Michael A. Caloyannides The Assault on Logic. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:91-95 [Journal ] Bruce Schneier The Speed of Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:96- [Journal ]