|
Journals in DBLP
- E. Eugene Schultz
Aligning disaster recovery and security incident response. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:505-506 [Journal]
Security views - Malware update. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:507-515 [Journal]
- P. Foote, T. Neudenberger
Beyond Sarbanes-Oxley compliance. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:516-518 [Journal]
- Nathan L. Clarke, Steven Furnell
Authentication of users on mobile telephones - A survey of attitudes and practices. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:519-527 [Journal]
- Vaibhav Gowadia, Csilla Farkas, Marco Valtorta
PAID: A Probabilistic Agent-Based Intrusion Detection system. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:529-545 [Journal]
- Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley
Query-directed passwords. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:546-560 [Journal]
- H. Chris Tseng, Benjamin Jack Culpepper
Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:561-570 [Journal]
- Fu-Yuan Lee, Shiuhpyng Shieh
Defending against spoofed DDoS attacks with path fingerprint. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:571-586 [Journal]
|