The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2008, volume: 27, number: 5-6


  1. From the Editor-in-Chief. [Citation Graph (, )][DBLP]


  2. Information security requirements - Interpreting the legal aspects. [Citation Graph (, )][DBLP]


  3. A SIP-oriented SPIT Management Framework. [Citation Graph (, )][DBLP]


  4. SMSSec: An end-to-end protocol for secure SMS. [Citation Graph (, )][DBLP]


  5. Critical study of neural networks in detecting intrusions. [Citation Graph (, )][DBLP]


  6. Application-based anomaly intrusion detection with dynamic information flow analysis. [Citation Graph (, )][DBLP]


  7. Building network attack graph for alert causal correlation. [Citation Graph (, )][DBLP]


  8. Enforcing memory policy specifications in reconfigurable hardware. [Citation Graph (, )][DBLP]


  9. Practical anonymous user authentication scheme with security proof. [Citation Graph (, )][DBLP]


  10. Information security management: An information security retrieval and awareness model for industry. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002