The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2000, volume: 19, number: 2

  1. Bill Hancock
    Alliance Formed to Fight Internet Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:108-109 [Journal]
  2. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:108-108 [Journal]
  3. Bill Hancock
    Code Paranoia about FBI Offerings to Detect DoS Infiltration. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:109-110 [Journal]
  4. Bill Hancock
    CIA says Russia and China are Building CyberSpy Organization. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:110-111 [Journal]
  5. Bill Hancock
    FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:111-113 [Journal]
  6. Bill Hancock
    The SEC Hires CyberInvestigators to Search for Fraud. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:111-111 [Journal]
  7. Bill Hancock
    Industry Teaming on ISACs. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:113-113 [Journal]
  8. Bill Hancock
    In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:113-114 [Journal]
  9. Bill Hancock
    Mafiaboy Hacker Eyed In Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:114-115 [Journal]
  10. Bill Hancock
    Japan Web Hackers Use Chinese and US Servers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:115-115 [Journal]
  11. Bill Hancock
    US Pentagon Defense Messaging System Shows Deficiencies in Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:116-117 [Journal]
  12. Bill Hancock
    Y2Hack Get-Together in Israel Under Political Attack. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:116-116 [Journal]
  13. Bill Hancock
    Security Managers Cite Need for Real-Time Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:117-117 [Journal]
  14. Stephen Hinde
    New Millennium, Old Failures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:119-127 [Journal]
  15. Steve Webb
    Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:128-132 [Journal]
  16. Gerald L. Kovacich, William C. Boni
    Internet Targets. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:133-140 [Journal]
  17. Michael Collins
    Telecommunications Crime - Part 3. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:141-148 [Journal]
  18. Mark Hoogenboom, Patrick Steemers
    Security For Remote Access And Mobile Application. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:149-163 [Journal]
  19. Lynette Barnard, Rossouw von Solms
    A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:185-194 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002