The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
1999, volume: 42, number: 7

  1. Diane Crawford
    Editorial Pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:5- [Journal]
  2. Robert Fox
    News Track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:11-13 [Journal]
  4. Meg McGinity
    Telecom Act, Scene One. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:15-18 [Journal]
  5. Neil Munro
    Inforwar: AK-47s, Lies, and Videotape. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:19-22 [Journal]
  6. Scott R. Tilley
    The Need for Speed. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:23-26 [Journal]
  7. John Gallaugher
    Challenging to New Conventional Wisdom of Net Commerce Strategies. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:27-29 [Journal]
  8. Brajendra Panda, Joseph Giordano
    Defensive Information Warfare - Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:30-32 [Journal]
  9. Shiu-Kai Chin
    High-Confidence Design for Security: Don't Trust - Verify. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:33-37 [Journal]
  10. Anup K. Ghosh, Jeffrey M. Voas
    Inoculating Software for Survivability. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:38-44 [Journal]
  11. Terrance Goan
    A Cop on the Beat Collecting and Appraising Intrusion Evidence. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:46-52 [Journal]
  12. Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo
    Testing and Evaluating: Computer Intrusion Detection Systems. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:53-61 [Journal]
  13. Matthew Stillerman, Carla Marceau, Maureen Stillman
    Intrusion Detection for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:62-69 [Journal]
  14. Sushil Jajodia, Catherine D. McCollum, Paul Ammann
    Trusted Recovery. [Citation Graph (0, 2)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:71-75 [Journal]
  15. Jim Waldo
    The Jini Architecture for Network-Centric Computing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:76-82 [Journal]
  16. David W. Plummer, Larry J. Dalton, Frank Peter
    The Recodable Locking Device. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:83-87 [Journal]
  17. Janice C. Sipior, Burke T. Ward
    The Dark Side of Employee Email. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:88-95 [Journal]
  18. Ned Kock
    A Case of Academic Plagiarism. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:96-104 [Journal]
  19. Peter G. Neumann
    Information is a Double-Edged Sword. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:120- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002