|
Journals in DBLP
- Dimitris Gritzalis
Embedding privacy in IT applications development. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:8-26 [Journal]
- A. S. Sodiya, H. O. D. Longe, A. T. Akinwale
A new two-tiered strategy to intrusion detection. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:27-44 [Journal]
- Kostas Maris, Kostas S. Metaxiotis, G. Pantou, Konstantinos Nikolopoulos, Eleni Tavanidou, Vassilis Assimakopoulos
D-TIFIS: a decision support system for options trading. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:45-65 [Journal]
- S. Srinivasan
Role of trust in e-business success. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:66-72 [Journal]
- Jau-Yang Liu, Jyh-Horng Michael Tarn, H. Joseph Wen
Adopting e-commerce Web site operation modes: The current state of large US firms. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:73-90 [Journal]
- Vassilis Tsoumas, Theodore Tryfonas
From risk analysis to effective security management: towards an automated approach. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:91-101 [Journal]
- William T. Rupp, Alan D. Smith
Exploring the impacts of P2P networks on the entertainment industry. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:102-116 [Journal]
- Moncef Belhadjali, Gary L. Whaley
A data mining approach to neural network training. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:117-124 [Journal]
- Vasilios Zorkadis, P. Donos
On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:125-137 [Journal]
|