|
Journals in DBLP
- H. Joseph Wen, Houn-Gee Chen, Hsin-Ginn Hwang
E-commerce Web site design: strategies and models. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:5-12 [Journal]
- Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen
Model calculations to estimate the probability of secret reconstruction in computer environments. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:13-20 [Journal]
- Euripidis Loukis, Diomidis Spinellis
Information systems security in the Greek public sector. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:21-31 [Journal]
- Mariana Gerber, Rossouw von Solms, Paul L. Overbeek
Formalizing information security requirements. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:32-37 [Journal]
- Nong Ye
Robust intrusion tolerance in information systems. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:38-43 [Journal]
- Kostas S. Metaxiotis, John E. Psarras, Dimitris Askounis
Building ontologies for production scheduling systems: towards a unified methodology. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:44-51 [Journal]
|