|
Journals in DBLP
- Marc Donner
From the Editors: Whose Data Are These, Anyway? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:5-6 [Journal]
- Shari Lawrence Pfleeger
Book Reviews. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:7- [Journal]
Letters to the Editor. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:8-9 [Journal]
- Greg Goth, Scott L. Andresen
News: Richard Clarke Talks Cybersecurity and JELL-O. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:11-17 [Journal]
- Noopur Davis, Watts S. Humphrey, Samuel T. Redwine Jr., Gerlinde Zibulski, Gary McGraw
Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:18-25 [Journal]
- William A. Arbaugh
Guest Editor's Introduction: Wired on Wireless. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:26-27 [Journal]
- Yih-Chun Hu, Adrian Perrig
A Survey of Secure Wireless Ad Hoc Routing. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:28-39 [Journal]
- David Johnston, Jesse Walker
Overview of IEEE 802.16 Security. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:40-48 [Journal]
- Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo
The Security and Privacy of Smart Vehicles. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:49-55 [Journal]
- Joel W. Branch, Nick L. Petroni Jr., Leendert van Doorn, David Safford
Autonomic 802.11 Wireless LAN Security Auditing. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:56-65 [Journal]
- Marc Donner
Cult Classics. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:66-68 [Journal]
- Deborah A. Frincke, Matt Bishop
Guarding the Castle Keep: Teaching with the Fortress Metaphor. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:69-72 [Journal]
- Salvatore J. Stolfo
Worm and Attack Early Warning. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:73-75 [Journal]
- Michael Lesk
Copyright and Creativity. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:76-78 [Journal]
- Ivaan Arce
The Kernel Craze. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:79-81 [Journal]
- Mark F. Vilardo
Online Impersonation in Securities Scams. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:82-85 [Journal]
- Richard Ford
The Wrong Stuff? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:86-89 [Journal]
- Paco Hope, Gary McGraw, Annie I. Antón
Misuse and Abuse Cases: Getting Past the Positive. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:90-92 [Journal]
- Michael A. Caloyannides
Security or Cosmetology? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:93-95 [Journal]
- Bruce Schneier
Security and Compliance. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:96- [Journal]
|