The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2002, volume: 21, number: 2

  1. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:101-112 [Journal]
  2. Gerald L. Kovacich, Andy Jones
    What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:113-119 [Journal]
  3. Bob Blakley
    Security Insights. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:120-125 [Journal]
  4. Joan L. Aron, Michael O'Leary, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider
    The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:142-163 [Journal]
  5. Victor R. L. Shen, Tzer-Shyong Chen
    A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:164-171 [Journal]
  6. Lech J. Janczewski, Frank Xinli Shi
    Development of Information Security Baselines for Healthcare Information Systems in New Zealand. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:172-192 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002