The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2005, volume: 3, number: 3

  1. Fred B. Schneider
    It Depends on What You Pay. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:3- [Journal]
  2. Martin R. Stytz
    Under the Black Hat. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:5- [Journal]
  3. Laurianne McLaughlin
    Interview: Holistic Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:6-8 [Journal]
  4. Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider
    Overview of Cyber Security: A Crisis of Prioritization. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:9-11 [Journal]
  5. Garrett Jones, Brent Kesler
    NewsBriefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:12-14 [Journal]
  6. Massoud Amin
    Guest Editor's Introduction: Infrastructure Security--Reliability and Dependability of Critical Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:15-17 [Journal]
  7. Mehmet Sahinoglu
    Security Meter: A Practical Decision-Tree Model to Quantify Risk. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:18-24 [Journal]
  8. Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen
    Collaborative Internet Worm Containment. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:25-33 [Journal]
  9. Simson L. Garfinkel, Ari Juels, Ravikanth Pappu
    RFID Privacy: An Overview of Problems and Proposed Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:34-43 [Journal]
  10. Thomas J. Walsh, D. Richard Kuhn
    Challenges in Securing Voice over IP. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:44-49 [Journal]
  11. Andrew W. Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-li Tian, Ahmet Ekin, Jonathan H. Connell, Chiao-Fe Shu, Max Lu
    Enabling Video Privacy through Computer Vision. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:50-57 [Journal]
  12. Marc Donner
    A Young Geek's Fancy Turns to...Science Fiction? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:58-60 [Journal]
  13. Cynthia E. Irvine, Michael F. Thompson, Ken Allen
    CyberCIEGE: Gaming for Information Assurance. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:61-64 [Journal]
  14. Brian D. Snow
    Four Ways to Improve Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:65-67 [Journal]
  15. Peter Gutmann, David Naccache, Charles C. Palmer
    When Hashes Collide. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:68-71 [Journal]
  16. Richard Ford
    Malcode Mysteries Revealed. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:72-75 [Journal]
  17. Thorsten Holz
    A Short Visit to the Bot Zoo. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:76-79 [Journal]
  18. Christian Skalka
    Programming Languages and Systems Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:80-83 [Journal]
  19. Michael E. Lesk
    Salute the Broadcast Flag. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:84-87 [Journal]
  20. Dan Taylor, Gary McGraw
    Adopting a Software Security Improvement Program. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:88-91 [Journal]
  21. Steven M. Bellovin
    Security and Privacy: Enemies or Allies? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:92- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002