The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2005, volume: 24, number: 5

  1. E. Eugene Schultz
    Non-infosec professionals in infosec? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:347-348 [Journal]
  2. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:349-358 [Journal]
  3. Richard LeVine
    Technology evolution drives need for greater information technology security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:359-361 [Journal]
  4. C. Andrew
    The five Ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:362-363 [Journal]
  5. Alex Biryukov, Joseph Lano, Bart Preneel
    Recent attacks on alleged SecurID and their practical implications. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:364-370 [Journal]
  6. G. Magklaras, Steven Furnell
    A preliminary model of end user sophistication for insider threat prediction in IT systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:371-380 [Journal]
  7. Chou-Chen Yang, Ren-Chiun Wang, Wei-Ting Liu
    Secure authentication scheme for session initiation protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:381-386 [Journal]
  8. D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii
    CIDS: An agent-based intrusion detection system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:387-398 [Journal]
  9. Heba Kamal Aslan
    Two-level controllers hierarchy for a scalable and distributed multicast security protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:399-408 [Journal]
  10. Anat Hovav, John D'Arcy
    Capital market reaction to defective IT products: The case of computer viruses. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:409-424 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002