The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security (compsec)

  1. Computers & Security, 1987,volume: 6, number: 3 (1 articles)
  2. Computers & Security, 1988,volume: 7 (1 articles)
  3. Computers & Security, 1989,volume: 8, number: 1 (11 articles)
  4. Computers & Security, 1989,volume: 8, number: 2 (11 articles)
  5. Computers & Security, 1989,volume: 8, number: 3 (9 articles)
  6. Computers & Security, 1989,volume: 8, number: 4 (10 articles)
  7. Computers & Security, 1989,volume: 8, number: 5 (10 articles)
  8. Computers & Security, 1989,volume: 8, number: 6 (8 articles)
  9. Computers & Security, 1989,volume: 8, number: 7 (8 articles)
  10. Computers & Security, 1989,volume: 8, number: 8 (9 articles)
  11. Computers & Security, 1990,volume: 9, number: 1 (10 articles)
  12. Computers & Security, 1990,volume: 9, number: 2 (9 articles)
  13. Computers & Security, 1990,volume: 9, number: 3 (8 articles)
  14. Computers & Security, 1990,volume: 9, number: 4 (8 articles)
  15. Computers & Security, 1990,volume: 9, number: 5 (9 articles)
  16. Computers & Security, 1990,volume: 9, number: 6 (10 articles)
  17. Computers & Security, 1990,volume: 9, number: 7 (8 articles)
  18. Computers & Security, 1990,volume: 9, number: 8 (7 articles)
  19. Computers & Security, 1991,volume: 10, number: 1 (8 articles)
  20. Computers & Security, 1991,volume: 10, number: 2 (6 articles)
  21. Computers & Security, 1991,volume: 10, number: 3 (14 articles)
  22. Computers & Security, 1991,volume: 10, number: 4 (8 articles)
  23. Computers & Security, 1991,volume: 10, number: 5 (6 articles)
  24. Computers & Security, 1991,volume: 10, number: 6 (8 articles)
  25. Computers & Security, 1991,volume: 10, number: 7 (7 articles)
  26. Computers & Security, 1991,volume: 10, number: 8 (6 articles)
  27. Computers & Security, 1992,volume: 11, number: 1 (7 articles)
  28. Computers & Security, 1992,volume: 11, number: 2 (6 articles)
  29. Computers & Security, 1992,volume: 11, number: 3 (9 articles)
  30. Computers & Security, 1992,volume: 11, number: 4 (6 articles)
  31. Computers & Security, 1992,volume: 11, number: 5 (8 articles)
  32. Computers & Security, 1992,volume: 11, number: 6 (7 articles)
  33. Computers & Security, 1992,volume: 11, number: 7 (7 articles)
  34. Computers & Security, 1992,volume: 11, number: 8 (9 articles)
  35. Computers & Security, 1993,volume: 12, number: 1 (7 articles)
  36. Computers & Security, 1993,volume: 12, number: 2 (7 articles)
  37. Computers & Security, 1993,volume: 12, number: 3 (8 articles)
  38. Computers & Security, 1993,volume: 12, number: 4 (6 articles)
  39. Computers & Security, 1993,volume: 12, number: 5 (7 articles)
  40. Computers & Security, 1993,volume: 12, number: 6 (8 articles)
  41. Computers & Security, 1993,volume: 12, number: 7 (9 articles)
  42. Computers & Security, 1993,volume: 12, number: 8 (8 articles)
  43. Computers & Security, 1994,volume: 13, number: 1 (8 articles)
  44. Computers & Security, 1994,volume: 13, number: 2 (7 articles)
  45. Computers & Security, 1994,volume: 13, number: 3 (6 articles)
  46. Computers & Security, 1994,volume: 13, number: 4 (6 articles)
  47. Computers & Security, 1994,volume: 13, number: 5 (7 articles)
  48. Computers & Security, 1994,volume: 13, number: 6 (7 articles)
  49. Computers & Security, 1994,volume: 13, number: 7 (8 articles)
  50. Computers & Security, 1994,volume: 13, number: 8 (8 articles)
  51. Computers & Security, 1995,volume: 14, number: 1 (5 articles)
  52. Computers & Security, 1995,volume: 14, number: 2 (7 articles)
  53. Computers & Security, 1995,volume: 14, number: 3 (7 articles)
  54. Computers & Security, 1995,volume: 14, number: 4 (7 articles)
  55. Computers & Security, 1995,volume: 14, number: 5 (7 articles)
  56. Computers & Security, 1995,volume: 14, number: 6 (6 articles)
  57. Computers & Security, 1995,volume: 14, number: 7 (6 articles)
  58. Computers & Security, 1995,volume: 14, number: 8 (7 articles)
  59. Computers & Security, 1996,volume: 15, number: 1 (8 articles)
  60. Computers & Security, 1996,volume: 15, number: 2 (7 articles)
  61. Computers & Security, 1996,volume: 15, number: 3 (9 articles)
  62. Computers & Security, 1996,volume: 15, number: 4 (7 articles)
  63. Computers & Security, 1996,volume: 15, number: 5 (7 articles)
  64. Computers & Security, 1996,volume: 15, number: 6 (10 articles)
  65. Computers & Security, 1996,volume: 15, number: 7 (8 articles)
  66. Computers & Security, 1996,volume: 15, number: 8 (12 articles)
  67. Computers & Security, 1997,volume: 16, number: 1 (7 articles)
  68. Computers & Security, 1997,volume: 16, number: 2 (4 articles)
  69. Computers & Security, 1997,volume: 16, number: 3 (5 articles)
  70. Computers & Security, 1997,volume: 16, number: 4 (10 articles)
  71. Computers & Security, 1997,volume: 16, number: 5 (9 articles)
  72. Computers & Security, 1997,volume: 16, number: 6 (6 articles)
  73. Computers & Security, 1997,volume: 16, number: 7 (8 articles)
  74. Computers & Security, 1997,volume: 16, number: 8 (7 articles)
  75. Computers & Security, 1998,volume: 17, number: 1 (11 articles)
  76. Computers & Security, 1998,volume: 17, number: 2 (11 articles)
  77. Computers & Security, 1998,volume: 17, number: 3 (8 articles)
  78. Computers & Security, 1998,volume: 17, number: 4 (9 articles)
  79. Computers & Security, 1998,volume: 17, number: 5 (9 articles)
  80. Computers & Security, 1998,volume: 17, number: 6 (8 articles)
  81. Computers & Security, 1998,volume: 17, number: 7 (9 articles)
  82. Computers & Security, 1998,volume: 17, number: 8 (7 articles)
  83. Computers & Security, 1999,volume: 18, number: 1 (9 articles)
  84. Computers & Security, 1999,volume: 18, number: 2 (8 articles)
  85. Computers & Security, 1999,volume: 18, number: 3 (7 articles)
  86. Computers & Security, 1999,volume: 18, number: 4 (10 articles)
  87. Computers & Security, 1999,volume: 18, number: 5 (8 articles)
  88. Computers & Security, 1999,volume: 18, number: 6 (4 articles)
  89. Computers & Security, 1999,volume: 18, number: 7 (8 articles)
  90. Computers & Security, 1999,volume: 18, number: 8 (6 articles)
  91. Computers & Security, 2000,volume: 19, number: 1 (24 articles)
  92. Computers & Security, 2000,volume: 19, number: 2 (19 articles)
  93. Computers & Security, 2000,volume: 19, number: 3 (29 articles)
  94. Computers & Security, 2000,volume: 19, number: 4 (22 articles)
  95. Computers & Security, 2000,volume: 19, number: 5 (30 articles)
  96. Computers & Security, 2000,volume: 19, number: 6 (27 articles)
  97. Computers & Security, 2000,volume: 19, number: 7 (21 articles)
  98. Computers & Security, 2000,volume: 19, number: 8 (20 articles)
  99. Computers & Security, 2001,volume: 20, number: 1 (21 articles)
  100. Computers & Security, 2001,volume: 20, number: 2 (6 articles)
  101. Computers & Security, 2001,volume: 20, number: 3 (7 articles)
  102. Computers & Security, 2001,volume: 20, number: 4 (6 articles)
  103. Computers & Security, 2001,volume: 20, number: 5 (8 articles)
  104. Computers & Security, 2001,volume: 20, number: 6 (9 articles)
  105. Computers & Security, 2001,volume: 20, number: 7 (8 articles)
  106. Computers & Security, 2001,volume: 20, number: 8 (8 articles)
  107. Computers & Security, 2002,volume: 21, number: 1 (8 articles)
  108. Computers & Security, 2002,volume: 21, number: 2 (6 articles)
  109. Computers & Security, 2002,volume: 21, number: 3 (7 articles)
  110. Computers & Security, 2002,volume: 21, number: 4 (10 articles)
  111. Computers & Security, 2002,volume: 21, number: 5 (11 articles)
  112. Computers & Security, 2002,volume: 21, number: 6 (11 articles)
  113. Computers & Security, 2002,volume: 21, number: 7 (12 articles)
  114. Computers & Security, 2002,volume: 21, number: 8 (10 articles)
  115. Computers & Security, 2003,volume: 22, number: 1 (11 articles)
  116. Computers & Security, 2003,volume: 22, number: 2 (11 articles)
  117. Computers & Security, 2003,volume: 22, number: 3 (11 articles)
  118. Computers & Security, 2003,volume: 22, number: 4 (10 articles)
  119. Computers & Security, 2003,volume: 22, number: 5 (12 articles)
  120. Computers & Security, 2003,volume: 22, number: 6 (14 articles)
  121. Computers & Security, 2003,volume: 22, number: 7 (11 articles)
  122. Computers & Security, 2003,volume: 22, number: 8 (11 articles)
  123. Computers & Security, 2004,volume: 23, number: 1 (10 articles)
  124. Computers & Security, 2004,volume: 23, number: 2 (9 articles)
  125. Computers & Security, 2004,volume: 23, number: 3 (8 articles)
  126. Computers & Security, 2004,volume: 23, number: 4 (10 articles)
  127. Computers & Security, 2004,volume: 23, number: 5 (10 articles)
  128. Computers & Security, 2004,volume: 23, number: 6 (7 articles)
  129. Computers & Security, 2004,volume: 23, number: 7 (10 articles)
  130. Computers & Security, 2004,volume: 23, number: 8 (10 articles)
  131. Computers & Security, 2005,volume: 24, number: 1 (10 articles)
  132. Computers & Security, 2005,volume: 24, number: 2 (12 articles)
  133. Computers & Security, 2005,volume: 24, number: 3 (8 articles)
  134. Computers & Security, 2005,volume: 24, number: 4 (10 articles)
  135. Computers & Security, 2005,volume: 24, number: 5 (10 articles)
  136. Computers & Security, 2005,volume: 24, number: 6 (11 articles)
  137. Computers & Security, 2005,volume: 24, number: 7 (8 articles)
  138. Computers & Security, 2005,volume: 24, number: 8 (10 articles)
  139. Computers & Security, 2006,volume: 25, number: 1 (10 articles)
  140. Computers & Security, 2006,volume: 25, number: 2 (9 articles)
  141. Computers & Security, 2006,volume: 25, number: 3 (11 articles)
  142. Computers & Security, 2006,volume: 25, number: 4 (8 articles)
  143. Computers & Security, 2006,volume: 25, number: 5 (7 articles)
  144. Computers & Security, 2006,volume: 25, number: 6 (11 articles)
  145. Computers & Security, 2006,volume: 25, number: 7 (7 articles)
  146. Computers & Security, 2006,volume: 25, number: 8 (5 articles)
  147. Computers & Security, 2007,volume: 26, number: 1 (13 articles)
  148. Computers & Security, 2007,volume: 26, number: 2 (10 articles)
  149. Computers & Security, 2007,volume: 26, number: 3 (8 articles)
  150. Computers & Security, 2007,volume: 26, number: 4 (8 articles)
  151. Computers & Security, 2007,volume: 26, number: 5 (7 articles)
  152. Computers & Security, 2007,volume: 26, number: 6 (3 articles)
  153. Computers & Security, 2007,volume: 26, number: 7-8 (8 articles)
  154. Computers & Security, 2008,volume: 27, number: 1-2 (7 articles)
  155. Computers & Security, 2008,volume: 27, number: 3-4 (6 articles)
  156. Computers & Security, 2008,volume: 27, number: 5-6 (10 articles)
  157. Computers & Security, 2008,volume: 27, number: 7-8 (11 articles)
  158. Computers & Security, 2009,volume: 28, number: 1-2 (13 articles)
  159. Computers & Security, 2009,volume: 28, number: 3-4 (11 articles)
  160. Computers & Security, 2009,volume: 28, number: 5 (7 articles)
  161. Computers & Security, 2009,volume: 28, number: 6 (12 articles)
  162. Computers & Security, 2009,volume: 28, number: 7 (20 articles)
  163. Computers & Security, 2010,volume: 29, number: 1 (11 articles)
  164. Computers & Security, 2010,volume: 29, number: 2 (10 articles)
  165. Computers & Security, 2010,volume: 29, number: 3 (5 articles)
  166. Computers & Security, 2010,volume: 29, number: 4 (11 articles)
  167. Computers & Security, 2010,volume: 29, number: 5 (10 articles)
  168. Computers & Security, 2010,volume: 29, number: 6 (7 articles)
  169. Computers & Security, 2010,volume: 29, number: 7 (6 articles)
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002