The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2004, volume: 23, number: 1

  1. E. Eugene Schultz
    Security training and awareness - fitting a square peg in a round hole. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:1-2 [Journal]
  2. Marcus K. Rogers, Kate Seigfried
    The future of computer forensics: a needs analysis survey. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:12-16 [Journal]
  3. Stuart King
    Applying application security standards - a case study. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:17-21 [Journal]
  4. John Leach
    TBSE - an engineering approach to the design of accurate and reliable security systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:22-28 [Journal]
  5. Ronald F. DeMara, Adam J. Rocke
    Mitigation of network tampering using dynamic dispatch of mobile agents. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:31-42 [Journal]
  6. Soumyo D. Moitra, Suresh L. Konda
    An empirical investigation of network attacks on computer systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:43-51 [Journal]
  7. Vinícius da Silveira Serafim, Raul Fernando Weber
    Restraining and repairing file system damage through file integrity control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:52-62 [Journal]
  8. Albin Zuccato
    Holistic security requirement engineering for electronic commerce. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:63-76 [Journal]
  9. Janusz Szczepanski, Elek Wajnryb, José M. Amigó, Maria V. Sanchez-Vives, M. Slater
    Biometric random number generators. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:77-84 [Journal]
  10. Brian McKenna
    Erratum to "Attacks on the (enhanced) Yang-Shieh authentication" [Comput Secur 22(8) (2003) 725-727]. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:85- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002