The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2005, volume: 24, number: 6

  1. E. Eugene Schultz
    The human factor in security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:425-426 [Journal]
  2. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:427-436 [Journal]
  3. C. Pollard
    Telecom fraud: The cost of doing nothing just went up. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:437-439 [Journal]
  4. Steven A. Hofmeyr
    Host intrusion prevention: Part of the operating system or on top of the operating system? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:440-442 [Journal]
  5. Basie von Solms
    Information Security Governance - Compliance management vs operational management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:443-447 [Journal]
  6. Terry L. Wiant
    Information security policy's impact on reporting security incidents. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:448-459 [Journal]
  7. Hsien-Chu Wu, Chin-Chen Chang
    A novel digital image watermarking scheme based on the vector quantization technique. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:460-471 [Journal]
  8. Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis
    The insider threat to information systems and the effectiveness of ISO17799. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:472-484 [Journal]
  9. Wolfgang Fischer, Niels Lepperhoff
    Can critical infrastructures rely on the Internet? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:485-491 [Journal]
  10. Philip Machanick
    A distributed systems approach to secure Internet mail. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:492-499 [Journal]
  11. Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu
    Improvement on the flexible tree-based key management framework. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:500-504 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002