Journals in DBLP
E. Eugene Schultz The US Government bigger and better information security? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:578-580 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:581-590 [Journal ] Stephen Hinde Spam, scams, chains, hoaxes and other junk mail. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:592-606 [Journal ] Andrew Armstrong Bugbear. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:607-608 [Journal ] Matt Bishop Trends in academic research: vulnerabilities analysis and intrusion detection. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:609-612 [Journal ] Brian McKenna Managed Security Services new economy relic or wave of the future? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:613-616 [Journal ] H. S. Venter , Jan H. P. Eloff Vulnerabilities categories for intrusion detection system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:617-619 [Journal ] Chris Pounder Security policy update. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:620-623 [Journal ] Babatunde Jayeju-akinsiku Technology and Electronic Communications Act 2000. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:624-628 [Journal ] Sarah Gordon , Richard Ford Cyberterrorism? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:636-647 [Journal ] Steve Kenny , Larry Korba Applying digital rights management systems to privacy rights management. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:648-664 [Journal ] Lei Fan , Jian-Hua Li , HongWen Zhu An enhancement of timestamp-based password authentication scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:665-667 [Journal ]