Journals in DBLP
George Cybenko A Critical Need, An Ambitious Mission, A New Magazine. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:5-9 [Journal ] Sandra Kay Miller Legal Battle Looming for Internet Protections Acts. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:10-12 [Journal ] Scott L. Andresen New Draft to Secure Cyberspace Leaked. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:13- [Journal ] Simson L. Garfinkel , Abhi Shelat Remembrance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:17-27 [Journal ] Nick L. Petroni Jr. , William A. Arbaugh The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:28-36 [Journal ] Crispin Cowan Software Security for Open-Source Systems. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:38-45 [Journal ] Joshua W. Haines , Dorene Kewley Ryder , Laura Tinnel , Stephen Taylor Validation of Sensor Alert Correlators. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:46-56 [Journal ] Michael Howard , Steve Lipner Inside the Windows Security Push. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:57-61 [Journal ] Marc Donner AI Bites Man? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:63-66 [Journal ] Matt Bishop What Is Computer Security? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:67-69 [Journal ] Daniel J. Ryan Two Views on Security Software Liability: Let the Legal System Decide. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:70-72 [Journal ] Carey Heckman Two Views on Security Software Liability: Using the Right Legal Tools. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:73-75 [Journal ] Michael Lesk Copyright Extension: Eldred v. Ashcroft. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:76-78 [Journal ] Jim Hearn International Participation: The Continuing March Toward Security and Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:79-81 [Journal ] Ivan Arce , Elias Levy An Analysis of the Slapper Worm. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:82-87 [Journal ] Sean W. Smith Fairy Dust, Secrets, and the Real World. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:89-93 [Journal ] Martin R. Stytz , James A. Whittaker Software Protection: Security's Last Stand? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:95-98 [Journal ] Michael Caloyannides Privacy vs. Information Technology. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:100-103 [Journal ] Bruce Schneier We Are All Security Consumers. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:104- [Journal ]