Search the dblp DataBase
Matthew J. Warren :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Matthew J. Warren , Lynn Margaret Batten Security Management: An Information Systems Setting. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:257-270 [Conf ] Warren Brooks , Matthew J. Warren Health Information Security Evaluation: Continued Development of an Object-Oriented Method. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:135-150 [Conf ] A. Jancic , Matthew J. Warren PKI - Advantages and Obstacles. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:104-114 [Conf ] Justin D. Pierce , Matthew J. Warren , David R. Mackay , Jason G. Wells Graphical Authentication: Justifications and Objectives. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:49-63 [Conf ] Graeme Pye , Matthew J. Warren Benchmarking E-business Security: A Model and Framework. [Citation Graph (0, 0)][DBLP ] AISM, 2005, pp:80-87 [Conf ] Justin D. Pierce , Matthew J. Warren , David R. Mackay , Jason G. Wells Graphical Authentication: An Architectural Design Specification. [Citation Graph (0, 0)][DBLP ] Australian Computer, Network & Information Forensics Conference, 2004, pp:76-82 [Conf ] Steven Furnell , Nichola Jane Salmons , Peter W. Sanders , Colin T. Stockel , Matthew J. Warren Approaches to Security in Healthcare Multimedia Systems. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:25-36 [Conf ] T. B. Busuttil , Matthew J. Warren An Approach for Critical Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:53-62 [Conf ] Graeme Pye , Matthew J. Warren Australian Commercial - Critical Infrastructure Management Protection. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:249-360 [Conf ] William Hutchinson , Matthew J. Warren The use of deception in systems. [Citation Graph (0, 0)][DBLP ] ICSTM, 2000, pp:- [Conf ] Matthew J. Warren , William Hutchinson Information Security - An E-learning Problem. [Citation Graph (0, 0)][DBLP ] ICWL, 2003, pp:21-26 [Conf ] Matthew J. Warren , William Hutchinson A Security Method for Healthcare Organisations. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 2001, pp:157-166 [Conf ] Matthew J. Warren , William Hutchinson The Future of Australian & New Zealand Security Standard AS/NZS 4444?. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 1999, pp:41-50 [Conf ] Matthew J. Warren Australia's Agenda for E-Security Education and Research. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:109-114 [Conf ] T. B. Busuttil , Matthew J. Warren CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:33-50 [Conf ] William Hutchinson , Matthew J. Warren Deception and reality: a challenge for the information and knowledge management function. [Citation Graph (0, 0)][DBLP ] IRMA Conference, 2000, pp:88-91 [Conf ] W. J. Brooks , Matthew J. Warren , William Hutchinson A Security Evaluation Criteria for Baseline Security Standards. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:79-90 [Conf ] W. J. Brooks , Matthew J. Warren , William Hutchinson ISO 17799 and Australian Healthcare Organisations. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:417-420 [Conf ] Matthew J. Warren , Steven Furnell , Peter W. Sanders ODESSA - a new approach to healthcare risk analysis. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:391-402 [Conf ] Matthew J. Warren , William Hutchinson Information Warfare: Fact or Fiction? [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:411-420 [Conf ] Matthew J. Warren , William Hutchinson Deception: A Tool and Curse for Security Management. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:327-338 [Conf ] Steven Furnell , Matthew J. Warren Computer hacking and cyber terrorism: the real threats in the new millennium? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:1, pp:28-34 [Journal ] William Hutchinson , Matthew J. Warren Attitudes of Australian information system managers against online attackers. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:3, pp:106-111 [Journal ] Matthew J. Warren , William Hutchinson A security risk management approach for e-commerce. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:5, pp:238-242 [Journal ] D. Hutchinson , Matthew J. Warren Security authentication for on-line Internet banking. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2001, v:25, n:3, pp:- [Journal ] Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.152secs