The SCEAS System
Navigation Menu

Search the dblp DataBase


Lech J. Janczewski: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Grace SauLan Loo, Bondic C. P. Tang, Lech J. Janczewski
    An Adaptable Human-Agent Collaboration Information System in Manufacturing (HACISM). [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2000, pp:445-452 [Conf]
  2. Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski
    Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:67-80 [Conf]
  3. Lech J. Janczewski
    Current information security protocols and an outlook for the future. [Citation Graph (0, 0)][DBLP]
    IRMA Conference, 2000, pp:578-581 [Conf]
  4. Lech J. Janczewski
    Data Security Model for Branch Offices of Big Organisations. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:153-164 [Conf]
  5. Lech J. Janczewski, Andrew M. Colarik
    World Framework for Security Benchmark Changes. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:397-400 [Conf]
  6. Lech J. Janczewski, Victor Portougal
    Assignment of Security Clearances in an Organization. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:51-64 [Conf]
  7. Erland Jonsson, Lech J. Janczewski
    A taxonomy and overview of information security experiments. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:139-150 [Conf]
  8. Lech J. Janczewski, Frank Xinli Shi
    Development of Information Security Baselines for Healthcare Information Systems in New Zealand. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:172-192 [Journal]
  9. Lech J. Janczewski, Victor Portougal
    "Need-to-know" principle and fuzzy security clearances modelling. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:210-217 [Journal]
  10. Victor Portougal, Lech J. Janczewski
    Industrial information-weight security models. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:205-211 [Journal]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002