|
Journals in DBLP
- Bill Hancock
U.S. DoD Puts Up Blocks to Code Red. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:451-467 [Journal]
- Stephen Hinde
Omnia te adversum spectantia, nulla retorsum*. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:468-474 [Journal]
- August Bequai
Organized Crime Goes Cyber. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:475-478 [Journal]
- Steve Purser
A Simple Graphical Tool For Modelling Trust. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:479-484 [Journal]
- Steven Philippsohn
Money Laundering on the Internet. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:485-490 [Journal]
- Bruce Schneier
Managed Security Monitoring: Network Security for the 21st Centur. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:491-503 [Journal]
- Basie von Solms
Information Security - A Multidimensional Discipline. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:504-508 [Journal]
- Reinhardt A. Botha, Jan H. P. Eloff
Access Control in Document-centric Workflow Systems An Agent-based Approach. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:525-532 [Journal]
- Wen-Hung Yeh, Jing-Jang Hwang
Hiding Digital Information Using a Novel System Scheme. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:6, pp:533-538 [Journal]
|