The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2007, volume: 26, number: 3


  1. Mobile computing: The next Pandora's Box. [Citation Graph (, )][DBLP]


  2. SVision: A novel visual network-anomaly identification technique. [Citation Graph (, )][DBLP]


  3. Modeling and analyzing the spread of active worms based on P2P systems. [Citation Graph (, )][DBLP]


  4. Measuring, analyzing and predicting security vulnerabilities in software systems. [Citation Graph (, )][DBLP]


  5. Evaluating information security tradeoffs: Restricting access can interfere with user tasks. [Citation Graph (, )][DBLP]


  6. M-CLIQUES: Modified CLIQUES key agreement for secure multicast. [Citation Graph (, )][DBLP]


  7. Adaptable security mechanism for dynamic environments. [Citation Graph (, )][DBLP]


  8. Holistic security management framework applied in electronic commerce. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002