|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:4-15 [Journal]
- Belden Menkus
A high rise building fire case study. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:19-23 [Journal]
- Robin L. Sherman
Distributed systems security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:24-28 [Journal]
- Bernard P. Zajac Jr.
Computer viral risks - how bad is the threat? [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:29-34 [Journal]
- Teresa F. Lunt
Security in database systems: A research perspective. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:41-56 [Journal]
- Atika Laribi, Dennis G. Kafura
A protection model incorporating both authorization and constraints. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:57-73 [Journal]
- Dennis Longley, S. Rigby
An automatic search for security flaws in key management schemes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:75-89 [Journal]
|