The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Klaus Brunnstein: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Klaus Brunnstein, Uwe Hübner, Eike Jessen, Paul-Thomas Kandzia, Manfred Seedig
    Welche Netze braucht die Wissenschaft? [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2002, pp:381-0 [Conf]
  2. Klaus Brunnstein
    Die Verletzlichkeit der "informatisierten Gesellschaft" und die Verantwortung der Informatiker/innen. [Citation Graph (0, 0)][DBLP]
    FIFF Jahrestagung, 1987, pp:37-41 [Conf]
  3. Klaus Brunnstein
    Zur Klassifikation von Computer-Viren: Der "Computer-Virus-Katalog". [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 1989, pp:498-509 [Conf]
  4. Simone Fischer-Hübner, Klaus Brunnstein
    Das Virus-Test-Centrum and der Universität Hamburg. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 1989, pp:648-652 [Conf]
  5. Klaus Brunnstein
    Perspectives of the Vulnerability of IT-based Societies. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:588-592 [Conf]
  6. Klaus Brunnstein
    Service Continuity Planning. [Citation Graph (0, 0)][DBLP]
    Managing Information Technology's Organisational Impact, 1991, pp:271-286 [Conf]
  7. Klaus Brunnstein, Simone Fischer-Hübner
    Risikoanalyse verteilter und vernetzter Systeme. [Citation Graph (0, 0)][DBLP]
    GI-Fachgespräch über Rechenzentren, 1989, pp:1-14 [Conf]
  8. Klaus Brunnstein
    Mit IT-Risiken umgehen lernen: Über Probleme der Beherrschbarkeit komplexer Informatiksysteme. [Citation Graph (0, 0)][DBLP]
    INFOS, 2001, pp:9-12 [Conf]
  9. Klaus Brunnstein
    Analysis of Java security and hostile applets. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:293-295 [Conf]
  10. Klaus Brunnstein
    Towards a holistic view of security and safety of enterprise information and communication technologies: adapting to a changing paradigm. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:325-336 [Conf]
  11. Wilfried Brauer, K. Kaiser, Klaus Brunnstein
    Brief an die Leser. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1994, v:17, n:5, pp:279-280 [Journal]
  12. Klaus Brunnstein
    Über Viren, Würmer und anderes seltsames Getier in Computer-Systemen: ein kleines "Informatik-Bestiarium". [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1987, v:29, n:10, pp:397-402 [Journal]
  13. Klaus Brunnstein, Simone Fischer-Hübner
    Möglichkeiten und Grenzen von Kriterienkatalogen. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1992, v:34, n:4, pp:391-400 [Journal]
  14. Klaus Brunnstein, Paul Schmitz
    Editorial zum Schwerpunktthema: Zur Beurteilung der Sicherheit von anwendungsorientierten Informationssystemen. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1992, v:34, n:4, pp:365-366 [Journal]
  15. Klaus Brunnstein
    Zur Entwicklung des Datenschutzes in der Informationsgesellschaft. [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2007, v:49, n:2, pp:132-0 [Journal]

  16. About the Role of IT Security in the Information Society. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002