|
Search the dblp DataBase
Theodore Tryfonas:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas
Distribution of Offensive Material Over Computer Networks: A Research Agenda. [Citation Graph (0, 0)][DBLP] ECIW, 2005, pp:355-362 [Conf]
- Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis
A Qualitative Approach to Information Availability. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:37-48 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Security Concerns for Contemporary Development Practices: A Case Study. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:421-436 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:347-356 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Perceptions of Security Contributing to the Implementation of Secure IS. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:313-324 [Conf]
- Vivienne Mee, Theodore Tryfonas, Iain Sutherland
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2006, v:3, n:3, pp:166-173 [Journal]
- Theodore Tryfonas, Evangelos A. Kiountouzis, Angeliki Poulymenakou
Embedding security practices in contemporary information systems development approaches. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:4, pp:183-197 [Journal]
- Vassilis Tsoumas, Theodore Tryfonas
From risk analysis to effective security management: towards an automated approach. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:91-101 [Journal]
Audit Log Unification and Review with Log Management Information Bases. [Citation Graph (, )][DBLP]
Hard-drive Disposal and Identity Fraud. [Citation Graph (, )][DBLP]
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code. [Citation Graph (, )][DBLP]
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Search in 0.032secs, Finished in 0.033secs
|