|
Journals in DBLP
- Bill Hancock
From the editor. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:88-89 [Journal]
- Richard Ford
Malware: Troy revisited. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:105-108 [Journal]
- August Bequai
Monitoring employee communications in cyberspace: The pitfalls facing management. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:109-112 [Journal]
- Stephen Hinde
Year 2000 update. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:113-119 [Journal]
- Sarah Gordon
Telephone tales. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:120-123 [Journal]
- Winn Schwartau
Surviving denial of service. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:124-133 [Journal]
- Mohammad Peyravian, Don Coppersmith
A structured symmetric-key block cipher. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:134-147 [Journal]
- Brendon Harris, Ray Hunt
Fairwall certification. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:2, pp:165-177 [Journal]
|