E. Eugene Schultz The gap between cryptography and information security: has it narrowed? [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:7, pp:531-532 [Journal]
Steve Purser Improving the ROI of the security management process. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:7, pp:542-546 [Journal]
Ming Li An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:7, pp:549-558 [Journal]