The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
1995, volume: 14, number: 5

  1. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:365-371 [Journal]
  2. Jean Hitchings
    Deficiencies of the traditional approach to information security and the requirements for a new methodology. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:377-383 [Journal]
  3. John Leach
    Dynamic authentication for smartcards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:385-389 [Journal]
  4. Sarah Gordon
    Technologically enabled crime: Shifting paradigms for the Year 2000. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:391-402 [Journal]
  5. Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas
    Design of a neural network for recognition and classification of computer viruses. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:435-448 [Journal]
  6. Muninder P. Kailay, Peter Jarratt
    RAMeX: a prototype expert system for computer security risk analysis and management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:449-463 [Journal]
  7. Thomas Hardjono, Jennifer Seberry
    Applications of smartcards for anonymous and verifiable databases. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:465-472 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002