The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2008, volume: 27, number: 7-8


  1. Editorial. [Citation Graph (, )][DBLP]


  2. Security beliefs and barriers for novice Internet users. [Citation Graph (, )][DBLP]


  3. Information security awareness in higher education: An exploratory study. [Citation Graph (, )][DBLP]


  4. Consensus ranking - An ICT security awareness case study. [Citation Graph (, )][DBLP]


  5. Criteria to evaluate Automated Personal Identification Mechanisms. [Citation Graph (, )][DBLP]


  6. An ontology-based policy for deploying secure SIP-based VoIP services. [Citation Graph (, )][DBLP]


  7. Secure log management for privacy assurance in electronic communications. [Citation Graph (, )][DBLP]


  8. An optimistic fair exchange protocol based on signature policies. [Citation Graph (, )][DBLP]


  9. Automated containment of rootkits attacks. [Citation Graph (, )][DBLP]


  10. Evaluation of a low-rate DoS attack against application servers. [Citation Graph (, )][DBLP]


  11. Dynamic models for computer viruses. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002