The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2005, volume: 24, number: 2

  1. E. Eugene Schultz
    Search engines: a growing contributor to security risk. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:87-88 [Journal]
  2. E. Eugene Schultz
    Lycos crosses the line. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:89-90 [Journal]

  3. Security views: Malware Update. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:91-98 [Journal]
  4. Basie von Solms
    Information Security governance: COBIT or ISO 17799 or both? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:99-104 [Journal]
  5. Theodosios Tsiakis, George Stephanides
    The economic approach of information security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:105-108 [Journal]
  6. John Marchesini, Sean W. Smith, Meiyuan Zhao
    Keyjacking: the surprising insecurity of client-side SSL. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:109-123 [Journal]
  7. Jeffrey M. Stanton, Kathryn R. Stam, Paul Mastrangelo, Jeffrey Jolton
    Analysis of end user security behaviors. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:124-133 [Journal]
  8. Shyh-Yih Wang, Chi-Sung Laih
    Cryptanalyses of two key assignment schemes based on polynomial interpolations. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:134-138 [Journal]
  9. Francesco Bergadano, Davide Cavagnino
    Dealing with packet loss in the Interactive Chained Stream Authentication protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:139-146 [Journal]
  10. Bilge Karabacak, Ibrahim Sogukpinar
    ISRAM: information security risk analysis method. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:147-159 [Journal]
  11. Han-Sung Kim, Sung Deok Cha
    Empirical evaluation of SVM-based masquerade detection using UNIX commands. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:160-168 [Journal]
  12. Rui Jiang, Li Pan, Jian-Hua Li
    An improvement on efficient anonymous auction protocols. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:169-174 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002