The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2004, volume: 2, number: 4

  1. Marc Donner
    From the Editors: A Witty Lesson. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:5- [Journal]

  2. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:7-8 [Journal]

  3. Book Reviews. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:10- [Journal]
  4. Adam Stone, Benjamin J. Alfonsi, Scott L. Andresen
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:12-15 [Journal]
  5. Ivaan Arce, Gary McGraw
    Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:17-19 [Journal]
  6. Jonathan D. Pincus, Brandon Baker
    Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:20-27 [Journal]
  7. Carolyn P. Meinel
    Cybercrime Treaty Could Chill Research. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:28-32 [Journal]
  8. Gregory B. White, Art Conklin
    The Appropriate Use of Force-on-Force Cyberexercises. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:33-37 [Journal]
  9. Sandra Ring, Eric Cole
    Taking a Lesson from Stealthy Rootkits. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:38-45 [Journal]
  10. Colleen Shannon, David Moore
    The Spread of the Witty Worm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:46-50 [Journal]
  11. Marc Donner
    Deus Est Machina. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:51-53 [Journal]
  12. Deborah A. Frincke, Matt Bishop
    Back to School. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:54-56 [Journal]
  13. Chip Elliott
    Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:57-61 [Journal]
  14. Michael Lesk
    Bigger Share of a Smaller Pie. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:62-64 [Journal]
  15. Elias Levy
    Approaching Zero. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:65-66 [Journal]
  16. Richard Guida, Robert Stahl, Thomas Bunt, Gary Secrest, Joseph Moorcones
    Deploying and Using Public Key Technology: Lessons Learned in Real Life. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:67-71 [Journal]
  17. Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky
    Honeypot Forensics Part I: Analyzing the Network. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:72-78 [Journal]
  18. Denis Verdon, Gary McGraw
    Risk Analysis in Software Design. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:79-84 [Journal]
  19. Michael A. Caloyannides
    Is Privacy Really Constraining Security or Is this a Red Herring? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:86-87 [Journal]
  20. Bruce Schneier
    Customers, Passwords, and Web Sites. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:88- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002