The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2003, volume: 1, number: 4

  1. George Cybenko
    Boiling Frogs? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:5- [Journal]

  2. S&P Welcomes New Editorial Board Members. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:6-7 [Journal]
  3. Laurianne McLaughlin, Rosemary Clandos
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:8-11 [Journal]
  4. Scott L. Andresen
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:12-13 [Journal]
  5. Martin R. Stytz
    Setting the Standard for Security Literature. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:14- [Journal]
  6. Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer
    Computer Forensics Education. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:15-23 [Journal]
  7. Daniel Geer, Kevin Soo Hoo, Andrew Jaquith
    Information Security: Why the Future Belongs to the Quants. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:24-32 [Journal]
  8. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver
    Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal]
  9. Christian S. Collberg, Ginger Myles, Andrew Huntwork
    Sandmark--A Tool for Software Protection Research. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:40-49 [Journal]
  10. Ting Yu, Marianne Winslett, Jason E. Holt
    Two Security Symposia. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:50-52 [Journal]

  11. Bacon Ice Cream: The Best Mix of Proactive and Reactive Security? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:53-57 [Journal]
  12. Elias Levy
    The Making of a Spam Zombie Army: Dissecting the Sobig Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:58-59 [Journal]
  13. Marc Donner
    The Girl with No Eyes. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:60-64 [Journal]
  14. Barbara Endicott-Popovsky
    Ethics and Teaching Information Assurance. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:65-67 [Journal]
  15. Bruce Potter
    Wireless Security's Future. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:68-72 [Journal]
  16. Michael Lesk
    Making the Copyright Law Work. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:73-74 [Journal]
  17. Jim Hearn
    Keeping Up Appearances. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:75-76 [Journal]
  18. Dave Ahmad
    The Rising Threat of Vulnerabilities Due to Integer Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:77-82 [Journal]
  19. Herbert H. Thompson
    Why Security Testing Is Hard. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:83-86 [Journal]
  20. Bill McCarty
    Botnets: Big and Bigger. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:87-90 [Journal]
  21. Michael A. Caloyannides
    The Assault on Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:91-95 [Journal]
  22. Bruce Schneier
    The Speed of Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:96- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002