The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2003, volume: 1, number: 1

  1. George Cybenko
    A Critical Need, An Ambitious Mission, A New Magazine. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:5-9 [Journal]
  2. Sandra Kay Miller
    Legal Battle Looming for Internet Protections Acts. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:10-12 [Journal]
  3. Scott L. Andresen
    New Draft to Secure Cyberspace Leaked. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:13- [Journal]
  4. Simson L. Garfinkel, Abhi Shelat
    Remembrance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:17-27 [Journal]
  5. Nick L. Petroni Jr., William A. Arbaugh
    The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:28-36 [Journal]
  6. Crispin Cowan
    Software Security for Open-Source Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:38-45 [Journal]
  7. Joshua W. Haines, Dorene Kewley Ryder, Laura Tinnel, Stephen Taylor
    Validation of Sensor Alert Correlators. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:46-56 [Journal]
  8. Michael Howard, Steve Lipner
    Inside the Windows Security Push. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:57-61 [Journal]
  9. Marc Donner
    AI Bites Man? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:63-66 [Journal]
  10. Matt Bishop
    What Is Computer Security? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:67-69 [Journal]
  11. Daniel J. Ryan
    Two Views on Security Software Liability: Let the Legal System Decide. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:70-72 [Journal]
  12. Carey Heckman
    Two Views on Security Software Liability: Using the Right Legal Tools. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:73-75 [Journal]
  13. Michael Lesk
    Copyright Extension: Eldred v. Ashcroft. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:76-78 [Journal]
  14. Jim Hearn
    International Participation: The Continuing March Toward Security and Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:79-81 [Journal]
  15. Ivan Arce, Elias Levy
    An Analysis of the Slapper Worm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:82-87 [Journal]
  16. Sean W. Smith
    Fairy Dust, Secrets, and the Real World. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:89-93 [Journal]
  17. Martin R. Stytz, James A. Whittaker
    Software Protection: Security's Last Stand? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:95-98 [Journal]
  18. Michael Caloyannides
    Privacy vs. Information Technology. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:100-103 [Journal]
  19. Bruce Schneier
    We Are All Security Consumers. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:104- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002