Journals in DBLP
E. Eugene Schultz Windows Vista: Microsoft's brave new world. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:99- [Journal ] Malware Update. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:100-108 [Journal ] Nathan L. Clarke , Steven Furnell Advanced user authentication for mobile devices. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:109-119 [Journal ] Konstantina Stoupa , Athena Vakali Clustering subjects in a credential-based access control framework. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:120-129 [Journal ] Michael Gaiman , Rahul Simha , Bhagirath Narahari Privacy-preserving programming using sython. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:130-136 [Journal ] Jianhua Yang , Shou-Hsuan Stephen Huang Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:137-144 [Journal ] Sangkyun Kim , Hong Joo Lee A study on decision consolidation methods using analytic models for security systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:145-153 [Journal ] Oleksiy Mazhelis , Seppo Puuronen A framework for behavior-based detection of user substitution in a mobile context. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:154-176 [Journal ] Ilan Oshri , Julia Kotlarsky , Corey Hirsch Information security in networkable Windows-based operating system devices: Challenges and solutions. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:177-182 [Journal ] Christopher J. Novak Investigative response: After the breach. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:183-185 [Journal ]