The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2005, volume: 24, number: 7

  1. E. Eugene Schultz
    Aligning disaster recovery and security incident response. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:505-506 [Journal]

  2. Security views - Malware update. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:507-515 [Journal]
  3. P. Foote, T. Neudenberger
    Beyond Sarbanes-Oxley compliance. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:516-518 [Journal]
  4. Nathan L. Clarke, Steven Furnell
    Authentication of users on mobile telephones - A survey of attitudes and practices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:519-527 [Journal]
  5. Vaibhav Gowadia, Csilla Farkas, Marco Valtorta
    PAID: A Probabilistic Agent-Based Intrusion Detection system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:529-545 [Journal]
  6. Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley
    Query-directed passwords. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:546-560 [Journal]
  7. H. Chris Tseng, Benjamin Jack Culpepper
    Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:561-570 [Journal]
  8. Fu-Yuan Lee, Shiuhpyng Shieh
    Defending against spoofed DDoS attacks with path fingerprint. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:571-586 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002