Journals in DBLP
E. Eugene Schultz Personal information compromises: It is time for the U.S. Government to wake up. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:261-262 [Journal ] Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:263-270 [Journal ] Basie von Solms , Rossouw von Solms From information security to ... business security? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:271-273 [Journal ] Steven Furnell Why users cannot use security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:274-279 [Journal ] David B. Chang , Carl S. Young Infection dynamics on the Internet. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:280-286 [Journal ] Wenbao Jiang , Hua Song , Yiqi Dai Real-time intrusion detection for high-speed networks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:287-294 [Journal ] Srilatha Chebrolu , Ajith Abraham , Johnson P. Thomas Feature deduction and ensemble design of intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:295-307 [Journal ] Rodolfo Villarroel , Eduardo Fernández-Medina , Mario Piattini Secure information systems development - a survey and comparison. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:308-321 [Journal ] Giampaolo Bella , Stefano Bistarelli Information Assurance for security protocols. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:322-333 [Journal ] Sihan Qing , Weiping Wen A survey and trends on Internet worms. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:334-346 [Journal ]