The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2006, volume: 25, number: 3

  1. E. Eugene Schultz
    Special systems: Overlooked sources of security risk? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:155- [Journal]
  2. Danny Bradbury
    Modeling network security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:163-164 [Journal]
  3. Sebastiaan H. von Solms
    Information Security - The Fourth Wave. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:165-168 [Journal]
  4. Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon
    Real-time analysis of intrusion detection alerts via correlation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:169-183 [Journal]
  5. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
  6. Wenliang Du, Mingdong Shang, Haizhi Xu
    A novel approach for computer security education using Minix instructional operating system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:190-200 [Journal]
  7. Jun Shao, Zhenfu Cao
    A traceable threshold signature scheme with multiple signing policies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:201-206 [Journal]
  8. John Ayoade
    Security implications in RFID and authentication processing framework. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:207-212 [Journal]
  9. Ming Li
    Change trend of averaged Hurst parameter of traffic under DDOS flood attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:213-220 [Journal]
  10. Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley
    An empirical examination of the reverse engineering process for binary files. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:221-228 [Journal]
  11. Guillermo González-Talaván
    A simple, configurable SMTP anti-spam filter: Greylists. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:229-236 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002