|
Journals in DBLP
- E. Eugene Schultz
Security Views. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:101-112 [Journal]
- Gerald L. Kovacich, Andy Jones
What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:113-119 [Journal]
- Bob Blakley
Security Insights. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:120-125 [Journal]
- Joan L. Aron, Michael O'Leary, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider
The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:142-163 [Journal]
- Victor R. L. Shen, Tzer-Shyong Chen
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:164-171 [Journal]
- Lech J. Janczewski, Frank Xinli Shi
Development of Information Security Baselines for Healthcare Information Systems in New Zealand. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:172-192 [Journal]
|