The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2006, volume: 25, number: 5

  1. E. Eugene Schultz
    The changing winds of information security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:315-316 [Journal]
  2. Stephen Flowerday, A. W. Blundell, Rossouw von Solms
    Continuous auditing technologies and models: A discussion. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:325-331 [Journal]
  3. Sanjeev Kumar
    PING attack - How bad is it? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:332-337 [Journal]
  4. Nathanael Paul, David Evans
    Comparing Java and .NET security: Lessons learned and missed. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:338-350 [Journal]
  5. Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris
    On Incident Handling and Response: A state-of-the-art approach. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:351-370 [Journal]
  6. Mingchao Ma, Steve Woodhead
    Authentication delegation for subscription-based remote network services. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:371-378 [Journal]
  7. Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
    A qualitative analysis of software security patterns. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:379-392 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002