The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2004, volume: 2, number: 3

  1. Marc Donner
    From the Editors: Whose Data Are These, Anyway? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:5-6 [Journal]
  2. Shari Lawrence Pfleeger
    Book Reviews. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:7- [Journal]

  3. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:8-9 [Journal]
  4. Greg Goth, Scott L. Andresen
    News: Richard Clarke Talks Cybersecurity and JELL-O. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:11-17 [Journal]
  5. Noopur Davis, Watts S. Humphrey, Samuel T. Redwine Jr., Gerlinde Zibulski, Gary McGraw
    Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:18-25 [Journal]
  6. William A. Arbaugh
    Guest Editor's Introduction: Wired on Wireless. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:26-27 [Journal]
  7. Yih-Chun Hu, Adrian Perrig
    A Survey of Secure Wireless Ad Hoc Routing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:28-39 [Journal]
  8. David Johnston, Jesse Walker
    Overview of IEEE 802.16 Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:40-48 [Journal]
  9. Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo
    The Security and Privacy of Smart Vehicles. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:49-55 [Journal]
  10. Joel W. Branch, Nick L. Petroni Jr., Leendert van Doorn, David Safford
    Autonomic 802.11 Wireless LAN Security Auditing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:56-65 [Journal]
  11. Marc Donner
    Cult Classics. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:66-68 [Journal]
  12. Deborah A. Frincke, Matt Bishop
    Guarding the Castle Keep: Teaching with the Fortress Metaphor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:69-72 [Journal]
  13. Salvatore J. Stolfo
    Worm and Attack Early Warning. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:73-75 [Journal]
  14. Michael Lesk
    Copyright and Creativity. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:76-78 [Journal]
  15. Ivaan Arce
    The Kernel Craze. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:79-81 [Journal]
  16. Mark F. Vilardo
    Online Impersonation in Securities Scams. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:82-85 [Journal]
  17. Richard Ford
    The Wrong Stuff? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:86-89 [Journal]
  18. Paco Hope, Gary McGraw, Annie I. Antón
    Misuse and Abuse Cases: Getting Past the Positive. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:90-92 [Journal]
  19. Michael A. Caloyannides
    Security or Cosmetology? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:93-95 [Journal]
  20. Bruce Schneier
    Security and Compliance. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:96- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002