The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Theodore Tryfonas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas
    Distribution of Offensive Material Over Computer Networks: A Research Agenda. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:355-362 [Conf]
  2. Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis
    A Qualitative Approach to Information Availability. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:37-48 [Conf]
  3. Theodore Tryfonas, Evangelos A. Kiountouzis
    Security Concerns for Contemporary Development Practices: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:421-436 [Conf]
  4. Theodore Tryfonas, Evangelos A. Kiountouzis
    Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:347-356 [Conf]
  5. Theodore Tryfonas, Evangelos A. Kiountouzis
    Perceptions of Security Contributing to the Implementation of Secure IS. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:313-324 [Conf]
  6. Vivienne Mee, Theodore Tryfonas, Iain Sutherland
    The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:3, pp:166-173 [Journal]
  7. Theodore Tryfonas, Evangelos A. Kiountouzis, Angeliki Poulymenakou
    Embedding security practices in contemporary information systems development approaches. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:4, pp:183-197 [Journal]
  8. Vassilis Tsoumas, Theodore Tryfonas
    From risk analysis to effective security management: towards an automated approach. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:91-101 [Journal]

  9. Audit Log Unification and Review with Log Management Information Bases. [Citation Graph (, )][DBLP]


  10. Hard-drive Disposal and Identity Fraud. [Citation Graph (, )][DBLP]


  11. A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code. [Citation Graph (, )][DBLP]


  12. A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  13. A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.033secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002