The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2007, volume: 26, number: 5


  1. Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. [Citation Graph (, )][DBLP]


  2. The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis. [Citation Graph (, )][DBLP]


  3. Authentication in a layered security approach for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  4. Using header session messages to anti-spamming. [Citation Graph (, )][DBLP]


  5. Security for a Multi-Agent System based on JADE. [Citation Graph (, )][DBLP]


  6. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN. [Citation Graph (, )][DBLP]


  7. Assessing the security perceptions of personal Internet users. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002