The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2006, volume: 25, number: 6

  1. E. Eugene Schultz
    Microsoft is back in the hot seat. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:393-394 [Journal]
  2. Danny Bradbury
    Microsoft's new window on security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:405-407 [Journal]
  3. Rossouw von Solms, Sebastiaan H. von Solms
    Information Security Governance: A model based on the Direct-Control Cycle. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:408-412 [Journal]
  4. Bilge Karabacak, Ibrahim Sogukpinar
    A quantitative method for ISO 17799 gap analysis. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:413-419 [Journal]
  5. Kumar Mangipudi, Rajendra Katti
    A Secure Identification and Key agreement protocol with user Anonymity (SIKA). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:420-425 [Journal]
  6. Hamida Seba
    FTKM: A fault-tolerant key management protocol for multicast communications. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:426-434 [Journal]
  7. Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng
    A secure extension of the Kwak-Moon group signcryption scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:435-444 [Journal]
  8. A. A. Abimbola, Jose Munoz, William J. Buchanan
    NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:445-451 [Journal]
  9. Emrah Tomur, Y. Murat Erten
    Application of temporal and spatial role based access control in 802.11 wireless networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:452-458 [Journal]
  10. Morteza Amini, Rasool Jalili, Hamid Reza Shahriari
    RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:459-468 [Journal]
  11. Zhi-hong Zuo, Qing-xin Zhu, Ming-Tian Zhou
    Infection, imitation and a hierarchy of computer viruses. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:469-473 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002