The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2005, volume: 3, number: 4

  1. George Cybenko
    The One-Eyed Man Is King. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:4-5 [Journal]
  2. Nathanael Paul
    A Closer Look at Viruses and Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:7- [Journal]
  3. Benjamin J. Alfonsi
    Alliance Addresses VoIP Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:8- [Journal]
  4. Axelle Apvrille, Makan Pourzandi
    Secure Software Development by Example. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:10-17 [Journal]
  5. Helayne T. Ray, Raghunath Vemuri, Hariprasad R. Kantubhukta
    Toward an Automated Attack Model for Red Teams. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:18-25 [Journal]
  6. Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, Jose Nazario
    The Blaster Worm: Then and Now. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:26-31 [Journal]
  7. Dimitrios Lekkas, Diomidis Spinellis
    Handling and Reporting Security Advisories: A Scorecard Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:32-41 [Journal]
  8. Urs E. Gattiker
    EICAR 2005. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:45-48 [Journal]
  9. Matt Bishop, Deborah A. Frincke
    A Human Endeavor: Lessons from Shakespeare and Beyond. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:49-51 [Journal]
  10. James Mulvenon
    Toward a Cyberconflict Studies Research Agenda. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:52-55 [Journal]
  11. Peter Gutmann, Ian Grigg
    Security Usability. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:56-58 [Journal]
  12. William H. Allen
    Computer Forensics. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:59-62 [Journal]
  13. Ivan Arce
    The Land of the Blind. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:63-67 [Journal]
  14. Sara Sinclair, Sean W. Smith
    The TIPPI Point: Toward Trustworthy Interfaces. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:68-71 [Journal]
  15. Martin R. Stytz
    Protecting Personal Privacy: Hauling Down the Jolly Roger. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:72-74 [Journal]
  16. Nancy R. Mead, Gary McGraw
    A Portal for Software Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:75-79 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002