Journals in DBLP
George Cybenko The One-Eyed Man Is King. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:4-5 [Journal ] Nathanael Paul A Closer Look at Viruses and Worms. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:7- [Journal ] Benjamin J. Alfonsi Alliance Addresses VoIP Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:8- [Journal ] Axelle Apvrille , Makan Pourzandi Secure Software Development by Example. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:10-17 [Journal ] Helayne T. Ray , Raghunath Vemuri , Hariprasad R. Kantubhukta Toward an Automated Attack Model for Red Teams. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:18-25 [Journal ] Michael Bailey , Evan Cooke , Farnam Jahanian , David Watson , Jose Nazario The Blaster Worm: Then and Now. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:26-31 [Journal ] Dimitrios Lekkas , Diomidis Spinellis Handling and Reporting Security Advisories: A Scorecard Approach. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:32-41 [Journal ] Urs E. Gattiker EICAR 2005. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:45-48 [Journal ] Matt Bishop , Deborah A. Frincke A Human Endeavor: Lessons from Shakespeare and Beyond. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:49-51 [Journal ] James Mulvenon Toward a Cyberconflict Studies Research Agenda. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:52-55 [Journal ] Peter Gutmann , Ian Grigg Security Usability. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:56-58 [Journal ] William H. Allen Computer Forensics. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:59-62 [Journal ] Ivan Arce The Land of the Blind. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:63-67 [Journal ] Sara Sinclair , Sean W. Smith The TIPPI Point: Toward Trustworthy Interfaces. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:68-71 [Journal ] Martin R. Stytz Protecting Personal Privacy: Hauling Down the Jolly Roger. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:72-74 [Journal ] Nancy R. Mead , Gary McGraw A Portal for Software Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:75-79 [Journal ]