|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1995, v:14, n:7, pp:574-585 [Journal]
- Christopher L. J. Holloway
Controlling the use of cryptographic keys. [Citation Graph (0, 0)][DBLP] Computers & Security, 1995, v:14, n:7, pp:587-598 [Journal]
- Sarah Gordon
Internet 101. [Citation Graph (0, 0)][DBLP] Computers & Security, 1995, v:14, n:7, pp:599-604 [Journal]
- Ben Soh, Tharam S. Dillon
Setting optimal intrusion-detection thresholds. [Citation Graph (0, 0)][DBLP] Computers & Security, 1995, v:14, n:7, pp:621-631 [Journal]
- Fred de Koning
A methodology for the design of security plans. [Citation Graph (0, 0)][DBLP] Computers & Security, 1995, v:14, n:7, pp:633-643 [Journal]
- James Backhouse, Gurpreet Dhillon
Managing computer crime: a research outlook. [Citation Graph (0, 0)][DBLP] Computers & Security, 1995, v:14, n:7, pp:645-651 [Journal]
|