|
Journals in DBLP
- Marc Donner
From the Editors: A Witty Lesson. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:5- [Journal]
Letters to the Editor. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:7-8 [Journal]
Book Reviews. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:10- [Journal]
- Adam Stone, Benjamin J. Alfonsi, Scott L. Andresen
News. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:12-15 [Journal]
- Ivaan Arce, Gary McGraw
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:17-19 [Journal]
- Jonathan D. Pincus, Brandon Baker
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:20-27 [Journal]
- Carolyn P. Meinel
Cybercrime Treaty Could Chill Research. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:28-32 [Journal]
- Gregory B. White, Art Conklin
The Appropriate Use of Force-on-Force Cyberexercises. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:33-37 [Journal]
- Sandra Ring, Eric Cole
Taking a Lesson from Stealthy Rootkits. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:38-45 [Journal]
- Colleen Shannon, David Moore
The Spread of the Witty Worm. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:46-50 [Journal]
- Marc Donner
Deus Est Machina. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:51-53 [Journal]
- Deborah A. Frincke, Matt Bishop
Back to School. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:54-56 [Journal]
- Chip Elliott
Quantum Cryptography. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:57-61 [Journal]
- Michael Lesk
Bigger Share of a Smaller Pie. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:62-64 [Journal]
- Elias Levy
Approaching Zero. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:65-66 [Journal]
- Richard Guida, Robert Stahl, Thomas Bunt, Gary Secrest, Joseph Moorcones
Deploying and Using Public Key Technology: Lessons Learned in Real Life. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:67-71 [Journal]
- Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky
Honeypot Forensics Part I: Analyzing the Network. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:72-78 [Journal]
- Denis Verdon, Gary McGraw
Risk Analysis in Software Design. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:79-84 [Journal]
- Michael A. Caloyannides
Is Privacy Really Constraining Security or Is this a Red Herring? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:86-87 [Journal]
- Bruce Schneier
Customers, Passwords, and Web Sites. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:88- [Journal]
|