The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Manag. Comput. Security (imcs)

  1. Inf. Manag. Comput. Security, 1993,volume: 1, number: 1 (5 articles)
  2. Inf. Manag. Comput. Security, 1993,volume: 1, number: 2 (7 articles)
  3. Inf. Manag. Comput. Security, 1993,volume: 1, number: 3 (3 articles)
  4. Inf. Manag. Comput. Security, 1993,volume: 1, number: 4 (7 articles)
  5. Inf. Manag. Comput. Security, 1993,volume: 1, number: 5 (5 articles)
  6. Inf. Manag. Comput. Security, 1994,volume: 2, number: 1 (6 articles)
  7. Inf. Manag. Comput. Security, 1994,volume: 2, number: 2 (5 articles)
  8. Inf. Manag. Comput. Security, 1994,volume: 2, number: 3 (7 articles)
  9. Inf. Manag. Comput. Security, 1994,volume: 2, number: 4 (6 articles)
  10. Inf. Manag. Comput. Security, 1994,volume: 2, number: 5 (5 articles)
  11. Inf. Manag. Comput. Security, 1995,volume: 3, number: 1 (9 articles)
  12. Inf. Manag. Comput. Security, 1995,volume: 3, number: 2 (6 articles)
  13. Inf. Manag. Comput. Security, 1995,volume: 3, number: 3 (5 articles)
  14. Inf. Manag. Comput. Security, 1995,volume: 3, number: 4 (5 articles)
  15. Inf. Manag. Comput. Security, 1995,volume: 3, number: 5 (6 articles)
  16. Inf. Manag. Comput. Security, 1996,volume: 4, number: 1 (8 articles)
  17. Inf. Manag. Comput. Security, 1996,volume: 4, number: 2 (10 articles)
  18. Inf. Manag. Comput. Security, 1996,volume: 4, number: 3 (7 articles)
  19. Inf. Manag. Comput. Security, 1996,volume: 4, number: 4 (6 articles)
  20. Inf. Manag. Comput. Security, 1996,volume: 4, number: 5 (6 articles)
  21. Inf. Manag. Comput. Security, 1997,volume: 5, number: 1 (7 articles)
  22. Inf. Manag. Comput. Security, 1997,volume: 5, number: 2 (6 articles)
  23. Inf. Manag. Comput. Security, 1997,volume: 5, number: 3 (6 articles)
  24. Inf. Manag. Comput. Security, 1997,volume: 5, number: 4 (5 articles)
  25. Inf. Manag. Comput. Security, 1997,volume: 5, number: 5 (5 articles)
  26. Inf. Manag. Comput. Security, 1998,volume: 6, number: 1 (5 articles)
  27. Inf. Manag. Comput. Security, 1998,volume: 6, number: 2 (4 articles)
  28. Inf. Manag. Comput. Security, 1998,volume: 6, number: 3 (5 articles)
  29. Inf. Manag. Comput. Security, 1998,volume: 6, number: 4 (6 articles)
  30. Inf. Manag. Comput. Security, 1998,volume: 6, number: 5 (7 articles)
  31. Inf. Manag. Comput. Security, 1999,volume: 7, number: 1 (5 articles)
  32. Inf. Manag. Comput. Security, 1999,volume: 7, number: 2 (5 articles)
  33. Inf. Manag. Comput. Security, 1999,volume: 7, number: 3 (5 articles)
  34. Inf. Manag. Comput. Security, 1999,volume: 7, number: 4 (5 articles)
  35. Inf. Manag. Comput. Security, 1999,volume: 7, number: 5 (7 articles)
  36. Inf. Manag. Comput. Security, 2000,volume: 8, number: 1 (5 articles)
  37. Inf. Manag. Comput. Security, 2000,volume: 8, number: 2 (6 articles)
  38. Inf. Manag. Comput. Security, 2000,volume: 8, number: 3 (5 articles)
  39. Inf. Manag. Comput. Security, 2000,volume: 8, number: 4 (3 articles)
  40. Inf. Manag. Comput. Security, 2000,volume: 8, number: 5 (7 articles)
  41. Inf. Manag. Comput. Security, 2001,volume: 9, number: 1 (6 articles)
  42. Inf. Manag. Comput. Security, 2001,volume: 9, number: 2 (5 articles)
  43. Inf. Manag. Comput. Security, 2001,volume: 9, number: 3 (5 articles)
  44. Inf. Manag. Comput. Security, 2001,volume: 9, number: 4 (5 articles)
  45. Inf. Manag. Comput. Security, 2001,volume: 9, number: 5 (6 articles)
  46. Inf. Manag. Comput. Security, 2002,volume: 10, number: 1 (6 articles)
  47. Inf. Manag. Comput. Security, 2002,volume: 10, number: 2 (5 articles)
  48. Inf. Manag. Comput. Security, 2002,volume: 10, number: 3 (5 articles)
  49. Inf. Manag. Comput. Security, 2002,volume: 10, number: 4 (7 articles)
  50. Inf. Manag. Comput. Security, 2002,volume: 10, number: 5 (6 articles)
  51. Inf. Manag. Comput. Security, 2003,volume: 11, number: 1 (6 articles)
  52. Inf. Manag. Comput. Security, 2003,volume: 11, number: 2 (6 articles)
  53. Inf. Manag. Comput. Security, 2003,volume: 11, number: 3 (6 articles)
  54. Inf. Manag. Comput. Security, 2003,volume: 11, number: 4 (5 articles)
  55. Inf. Manag. Comput. Security, 2003,volume: 11, number: 5 (7 articles)
  56. Inf. Manag. Comput. Security, 2004,volume: 12, number: 1 (9 articles)
  57. Inf. Manag. Comput. Security, 2004,volume: 12, number: 2 (5 articles)
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002