|
Journals in DBLP
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
Keystroke dynamics on a mobile handset: a feasibility study. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:161-166 [Journal]
- Jimmy J. M. Ng, K. X. Li
Implications of ICT for knowledge management in globalization. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:167-174 [Journal]
- Joseph S. Sherif, Rod Ayers, Tommy G. Dearmond
Intrusion detection: the art and the practice. Part I. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:175-186 [Journal]
- Raju Ramaswamy
A novel approach to solve DSL network data rate problems. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:187-194 [Journal]
- Simeon Xenitellis
Identifying security vulnerabilities through input flow tracing and analysis. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:195-199 [Journal]
|