The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2009, volume: 28, number: 7


  1. Editorial. [Citation Graph (, )][DBLP]


  2. Information security policy: An organizational-level process model. [Citation Graph (, )][DBLP]


  3. Human and organizational factors in computer and information security: Pathways to vulnerabilities. [Citation Graph (, )][DBLP]


  4. Risk profiles and distributed risk assessment. [Citation Graph (, )][DBLP]


  5. Adapting usage control as a deterrent to address the inadequacies of access controls. [Citation Graph (, )][DBLP]


  6. Security threats scenarios in trust and reputation models for distributed systems. [Citation Graph (, )][DBLP]


  7. DFANS: A highly efficient strategy for automated trust negotiation. [Citation Graph (, )][DBLP]


  8. What the heck is this application doing? - A security-by-contract architecture for pervasive services. [Citation Graph (, )][DBLP]


  9. Utilizing bloom filters for detecting flooding attacks against SIP based services. [Citation Graph (, )][DBLP]


  10. Client-side cross-site scripting protection. [Citation Graph (, )][DBLP]


  11. Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach. [Citation Graph (, )][DBLP]


  12. Confidence in smart token proximity: Relay attacks revisited. [Citation Graph (, )][DBLP]


  13. Defending passive worms in unstructured P2P networks based on healthy file dissemination. [Citation Graph (, )][DBLP]


  14. On the development of an internetwork-centric defense for scanning worms. [Citation Graph (, )][DBLP]


  15. A concise cost analysis of Internet malware. [Citation Graph (, )][DBLP]


  16. Providing secure execution environments with a last line of defense against Trojan circuit attacks. [Citation Graph (, )][DBLP]


  17. A new steganography algorithm based on color histograms for data embedding into raw video streams. [Citation Graph (, )][DBLP]


  18. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. [Citation Graph (, )][DBLP]


  19. A schema for protecting the integrity of databases. [Citation Graph (, )][DBLP]


  20. Design and implementation of highly reliable dual-computer systems. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002