Journals in DBLP
E. Eugene Schultz Taking a stand on hackers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:382-384 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:385-396 [Journal ] Bill Hancock Security crisis management the basics. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:397-401 [Journal ] Karin Höne , Jan H. P. Eloff Information security policy what do international information security standards say? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:402-409 [Journal ] Andy Nikishin Much Ado About Nothing: Win32 Perrun. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:410-412 [Journal ] William J. Caelli Trusted ...or... trustworthy: the search for a new paradigm for computer and network security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:413-420 [Journal ] Brian McKenna Enterprise in focus at NetSec 2002. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:421-423 [Journal ] Stephen Hinde The perils of privacy. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:424-432 [Journal ] Yihua Liao , V. Rao Vemuri Use of K-Nearest Neighbor classifier for intrusion detection. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:439-448 [Journal ] Der-Chyuan Lou , Jiang-Lung Liu Steganographic Method for Secure Communications. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:449-460 [Journal ] Marit Hansen , Kristian Köhntopp , Andreas Pfitzmann The Open Source approach opportunities and limitations with respect to security and privacy. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:461-471 [Journal ]