|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:4-14 [Journal]
- L. G. Lawrence
The role of roles. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:15-21 [Journal]
- Joseph M. Pujals
Security and privacy. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:22-27 [Journal]
- Steve Donovan
Security of PCs in a distributed environment. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:28-31 [Journal]
- Charles Cresson Wood, William W. Banks Jr.
Human error: an overlooked but significant information security problem. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:51-60 [Journal]
- Thomas A. Longstaff, E. Eugene Schultz
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:61-77 [Journal]
- Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger
A survey of security issues in office computation and the application of secure computing models to office systems. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:79-97 [Journal]
|