The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matthew J. Warren: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew J. Warren, Lynn Margaret Batten
    Security Management: An Information Systems Setting. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:257-270 [Conf]
  2. Warren Brooks, Matthew J. Warren
    Health Information Security Evaluation: Continued Development of an Object-Oriented Method. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:135-150 [Conf]
  3. A. Jancic, Matthew J. Warren
    PKI - Advantages and Obstacles. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:104-114 [Conf]
  4. Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells
    Graphical Authentication: Justifications and Objectives. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:49-63 [Conf]
  5. Graeme Pye, Matthew J. Warren
    Benchmarking E-business Security: A Model and Framework. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:80-87 [Conf]
  6. Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells
    Graphical Authentication: An Architectural Design Specification. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:76-82 [Conf]
  7. Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren
    Approaches to Security in Healthcare Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:25-36 [Conf]
  8. T. B. Busuttil, Matthew J. Warren
    An Approach for Critical Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:53-62 [Conf]
  9. Graeme Pye, Matthew J. Warren
    Australian Commercial - Critical Infrastructure Management Protection. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:249-360 [Conf]
  10. William Hutchinson, Matthew J. Warren
    The use of deception in systems. [Citation Graph (0, 0)][DBLP]
    ICSTM, 2000, pp:- [Conf]
  11. Matthew J. Warren, William Hutchinson
    Information Security - An E-learning Problem. [Citation Graph (0, 0)][DBLP]
    ICWL, 2003, pp:21-26 [Conf]
  12. Matthew J. Warren, William Hutchinson
    A Security Method for Healthcare Organisations. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:157-166 [Conf]
  13. Matthew J. Warren, William Hutchinson
    The Future of Australian & New Zealand Security Standard AS/NZS 4444?. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:41-50 [Conf]
  14. Matthew J. Warren
    Australia's Agenda for E-Security Education and Research. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:109-114 [Conf]
  15. T. B. Busuttil, Matthew J. Warren
    CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:33-50 [Conf]
  16. William Hutchinson, Matthew J. Warren
    Deception and reality: a challenge for the information and knowledge management function. [Citation Graph (0, 0)][DBLP]
    IRMA Conference, 2000, pp:88-91 [Conf]
  17. W. J. Brooks, Matthew J. Warren, William Hutchinson
    A Security Evaluation Criteria for Baseline Security Standards. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:79-90 [Conf]
  18. W. J. Brooks, Matthew J. Warren, William Hutchinson
    ISO 17799 and Australian Healthcare Organisations. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:417-420 [Conf]
  19. Matthew J. Warren, Steven Furnell, Peter W. Sanders
    ODESSA - a new approach to healthcare risk analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:391-402 [Conf]
  20. Matthew J. Warren, William Hutchinson
    Information Warfare: Fact or Fiction? [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:411-420 [Conf]
  21. Matthew J. Warren, William Hutchinson
    Deception: A Tool and Curse for Security Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:327-338 [Conf]
  22. Steven Furnell, Matthew J. Warren
    Computer hacking and cyber terrorism: the real threats in the new millennium? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:1, pp:28-34 [Journal]
  23. William Hutchinson, Matthew J. Warren
    Attitudes of Australian information system managers against online attackers. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:3, pp:106-111 [Journal]
  24. Matthew J. Warren, William Hutchinson
    A security risk management approach for e-commerce. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2003, v:11, n:5, pp:238-242 [Journal]
  25. D. Hutchinson, Matthew J. Warren
    Security authentication for on-line Internet banking. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2001, v:25, n:3, pp:- [Journal]

  26. Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. [Citation Graph (, )][DBLP]


Search in 0.033secs, Finished in 0.034secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002