Journals in DBLP
E. Eugene Schultz The Sorry State of Law Enforcement. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:290-292 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:293-302 [Journal ] Steve Purser Why access control is difficult. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:303-309 [Journal ] Stephen Hinde Security surveys spring crop. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:310-321 [Journal ] Andy Nikishin The Klez.H worm dissected. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:322-327 [Journal ] Chris Pounder The emergence of a comprehensive obligation towards computer security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:328-332 [Journal ] August Bequai Syndicated crime and international terrorism: the lessons of `9-11'. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:333-337 [Journal ] Younghwa Lee , Jintae Lee , Zoonky Lee Integrating Software Lifecycle Process Standards with Security Engineering. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:345-355 [Journal ] Peter Ward , Clifton L. Smith The Development of Access Control Policies for Information Technology Systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:356-371 [Journal ] Hung-Yu Chien , Jinn-ke Jan , Yuh-Min Tseng An Efficient and Practical Solution to Remote Authentication: Smart Card. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:372-375 [Journal ]