Journals in DBLP
Giampaolo Bella , Peter Y. A. Ryan Guest Editors' preface. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:697-0 [Journal ] Stefano Bistarelli , Simon N. Foley , Barry O'Sullivan A soft constraint-based approach to the cascade vulnerability problem. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:699-720 [Journal ] Christian S. Collberg , Tapas Ranjan Sahoo Software watermarking in the frequency domain: Implementation, analysis, and attacks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:721-755 [Journal ] Aleksandra Nenadic , Ning Zhang , Qi Shi RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:757-777 [Journal ] Christos Siaterlis , Vasilis Maglaris One step ahead to multisensor data fusion for DDoS detection. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:779-806 [Journal ]