The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2000, volume: 19, number: 4

  1. Bill Hancock
    Suspected Hackers Arrested in Russian Credit-Card Fraud. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:296-296 [Journal]
  2. Bill Hancock
    Intel Eliminates ID from New Chips. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:296-297 [Journal]
  3. Bill Hancock
    European Parliament Doesn't Like Anonymity Online. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:297-297 [Journal]
  4. Bill Hancock
    DOD Finds Plans Online Reserve Unit Assesses Risk. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:297-298 [Journal]
  5. Bill Hancock
    Agencies Are "Own Worst Enemy". [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:298-298 [Journal]
  6. Bill Hancock
    US Department of Energy Security Criticized - Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:298-300 [Journal]
  7. Bill Hancock
    This is What Happens When You Lose Your Computer With Classified Data On It.... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:300-301 [Journal]
  8. Bill Hancock
    Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:301-302 [Journal]
  9. Bill Hancock
    Justice Department Conducting Criminal Probe in Former CIA Director Activities. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:302-303 [Journal]
  10. Bill Hancock
    Apache Site Defaced. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:303-305 [Journal]
  11. Bill Hancock
    US and Europe Cybercrime Agreement Problems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:306-307 [Journal]
  12. Bill Hancock
    Cyberstalking on the Rise. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:307-308 [Journal]
  13. Bill Hancock
    Large Child Pornography Ring Busted in Texas. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:308-309 [Journal]
  14. Bill Hancock
    New Denial of Service Attack on Internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:309-310 [Journal]
  15. Bill Hancock
    US Supreme Court Confirms ISPs Not Liable in E-mail Messages. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:310-310 [Journal]
  16. Bill Hancock
    Software Scam - 17 Indicted. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:310-311 [Journal]
  17. Stephen Hinde
    Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:312-320 [Journal]
  18. Richard Barber
    Security in a Mobile World Is Bluetooth the Answer? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:321-325 [Journal]
  19. Gerald L. Kovacich
    Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:326-336 [Journal]
  20. Julie D. Nosworthy
    Implementing Information Security In The 21st Century Do You Have the Balancing Factors? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:337-347 [Journal]
  21. Petra van Krugten, Mark Hoogenboom
    B2C Security Be Just Secure Enough. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:348-356 [Journal]
  22. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002