The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2000, volume: 19, number: 6

  1. Bill Hancock
    A Need for a Network Security Czar. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:476-477 [Journal]
  2. Bill Hancock
    US Government Fighting for Expanded Wiretap Laws. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:477-477 [Journal]
  3. Bill Hancock
    E-Commerce Paranoia: Flaws in Code. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:477-479 [Journal]
  4. Bill Hancock
    Truly Certified: Security Certifications Updat. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:479-480 [Journal]
  5. Bill Hancock
    Digital Certificates Get Creative. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:480-487 [Journal]
  6. Bill Hancock
    Health Care Security: A Hard Look at a Growing Problem. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:482-482 [Journal]
  7. Bill Hancock
    Philippine Government Creates Incident Response Team. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:483-483 [Journal]
  8. Bill Hancock
    Safeway UK's Website Shut Down. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:483-483 [Journal]
  9. Bill Hancock
    DDoS Defence Gets Regulatory. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:483-485 [Journal]
  10. Bill Hancock
    Visa's Ten Commandments for E-Security Online. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:485-486 [Journal]
  11. Bill Hancock
    `Porngate'? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:486-487 [Journal]
  12. Bill Hancock
    What You Sell Online in France Could Be Restricted.... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:487-487 [Journal]
  13. Bill Hancock
    Hackers Still Love to Attack the Pentago. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:488-488 [Journal]
  14. Bill Hancock
    Spying At Home: A New Pastime to Detect Online Romanc. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:488-491 [Journal]
  15. Bill Hancock
    Is a Convicted Hacker Really Reformed and Should You Hire Them? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:491-493 [Journal]
  16. Bill Hancock
    DefCon Recruiting JamFest. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:493-494 [Journal]
  17. Bill Hancock
    Hacker Target: Mobile Phones. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:494-495 [Journal]
  18. Bill Hancock
    GeoCities Ordered to Report on Information Poste. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:495-496 [Journal]
  19. Bill Hancock
    E-Mail Privacy Issues Escalate. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:495-495 [Journal]
  20. Bill Hancock
    Hackers Breach Firewall. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:496-497 [Journal]
  21. Bill Hancock
    Lotus Domino Holes Up. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:497-498 [Journal]
  22. Stephen Hinde
    Fireworks, Beer and Old Halfpennies - The Risks of Assumption. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:499-504 [Journal]
  23. Gerald L. Kovacich
    Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:505-519 [Journal]
  24. Fred Cohen
    A Mathematical Structure of Simple Defensive Network Deception. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:520-528 [Journal]
  25. Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds
    Authentication and Supervision: A Survey of User Attitudes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:529-539 [Journal]
  26. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal]
  27. Andres Torrubia, Francisco J. Mora
    Information Security in Multiprocessor Systems Based on the X86 Architecture. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:559-563 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002