The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter G. Neumann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell
    Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal]
  2. Peter G. Neumann
    Risks, Responsibilities, and the Future: Walking the Tightwire. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1995, pp:257- [Conf]
  3. Peter G. Neumann, Richard J. Feiertag
    PSOS Revisited. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:208-216 [Conf]
  4. Peter G. Neumann
    Social and Technical Implications of Nonproprietary Software. [Citation Graph (0, 0)][DBLP]
    BSDCon, 2003, pp:- [Conf]
  5. Peter G. Neumann
    System and network trustworthiness in perspective. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:1-5 [Conf]
  6. Peter G. Neumann
    Achieving Principled Assuredly Trustworthy Composable Systems and Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:182-187 [Conf]
  7. Peter G. Neumann
    Toward a Methodology for Designing Large Systems and Verifying Their Properties. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1974, pp:52-67 [Conf]
  8. Peter G. Neumann
    Developing Complex Software for Critical Systems. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1992, pp:117-131 [Conf]
  9. Peter G. Neumann
    When Can Formal Methods Make a Real Difference? [Citation Graph (0, 0)][DBLP]
    ICFEM, 2004, pp:12- [Conf]
  10. Peter G. Neumann
    Requirements-Related Risks in Critical Systems. [Citation Graph (0, 0)][DBLP]
    ICRE, 2000, pp:3-0 [Conf]
  11. Peter G. Neumann
    Certitude and Rectitude. [Citation Graph (0, 0)][DBLP]
    ICRE, 2000, pp:153- [Conf]
  12. Peter G. Neumann, Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson
    Software Development and Proofs of Multi-Level Security. [Citation Graph (0, 0)][DBLP]
    ICSE, 1976, pp:421-428 [Conf]
  13. Peter G. Neumann, Phillip A. Porras
    Experience with EMERALD to Date. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:73-80 [Conf]
  14. Steven Fraser, Gregor Kiczales, Ricardo Lopez, Peter G. Neumann, Linda M. Northrop, Martin C. Rinard, Douglas C. Schmidt, Kevin Sullivan
    The ultra challenge: software systems beyond big. [Citation Graph (0, 0)][DBLP]
    OOPSLA Companion, 2006, pp:929-933 [Conf]
  15. Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman
    Views for Multilevel Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:156-172 [Conf]
  16. Peter G. Neumann
    Robust Nonproprietary Software. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:122-123 [Conf]
  17. Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel
    Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal]
  18. Rebecca Mercuri, Peter G. Neumann
    System integrity revisited. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:1, pp:160- [Journal]
  19. Rebecca Mercuri, Peter G. Neumann
    Security by obscurity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:11, pp:160- [Journal]
  20. Peter G. Neumann
    A Tale of Two Thousands. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:3, pp:144- [Journal]
  21. Peter G. Neumann
    Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:4, pp:136- [Journal]
  22. Peter G. Neumann
    Risks in retrospect. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:7, pp:144- [Journal]
  23. Peter G. Neumann
    Missile defense. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:9, pp:128- [Journal]
  24. Peter G. Neumann
    What to know about risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:136- [Journal]
  25. Peter G. Neumann
    Gambling on system accountability. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:2, pp:120- [Journal]
  26. Peter G. Neumann
    E-epistemology and misinformation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:5, pp:104- [Journal]
  27. Peter G. Neumann
    Risks in trusting untrustworthiness. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:9, pp:120- [Journal]
  28. Peter G. Neumann
    Information system security redux. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:136- [Journal]
  29. Peter G. Neumann
    Optimistic optimization. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:6, pp:112- [Journal]
  30. Peter G. Neumann
    The big picture. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:9, pp:112- [Journal]
  31. Peter G. Neumann
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:10, pp:28-30 [Journal]
  32. Peter G. Neumann
    Responsibilities of technologists. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:2, pp:128- [Journal]
  33. Peter G. Neumann
    Anticipating disasters. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:128- [Journal]
  34. Peter G. Neumann
    Trustworthy systems revisited. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:152- [Journal]
  35. Peter G. Neumann
    A Further View of the First Quarter Century, Introduction to the April 1984 Special Section. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1984, v:27, n:4, pp:343- [Journal]
  36. Peter G. Neumann
    Risks in Computerized Elections. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1990, v:33, n:11, pp:170- [Journal]
  37. Peter G. Neumann
    Ghosts, Mysteries and Uncertainty. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1990, v:33, n:10, pp:170- [Journal]
  38. Peter G. Neumann
    A Few Old Coincidences. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1990, v:33, n:9, pp:202- [Journal]
  39. Peter G. Neumann
    Insecurity about Security? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1990, v:33, n:8, pp:170- [Journal]
  40. Peter G. Neumann
    Some Reflections on a Telephone Switching Problem. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1990, v:33, n:7, pp:154- [Journal]
  41. Peter G. Neumann
    The Not-So-Accidental Holist. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:9, pp:122- [Journal]
  42. Peter G. Neumann
    Computers, Ethics, and Values. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:7, pp:106- [Journal]
  43. Peter G. Neumann
    Expecting the Unexpected Mayday. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:5, pp:128- [Journal]
  44. Peter G. Neumann
    Interpreting (Mis)information. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:4, pp:144- [Journal]
  45. Peter G. Neumann
    Putting on Your Best Interface. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:3, pp:138- [Journal]
  46. Peter G. Neumann
    Certifying Professionals. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:2, pp:130- [Journal]
  47. Peter G. Neumann
    The Clock Grows at Midnight. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:1, pp:170- [Journal]
  48. Peter G. Neumann
    The Human Element. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:11, pp:150- [Journal]
  49. Peter G. Neumann
    Collaborative Effords. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:12, pp:162- [Journal]
  50. Peter G. Neumann
    Survivable Systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:5, pp:130- [Journal]
  51. Peter G. Neumann
    Aggravation by Computer: Life, Death, and Taxes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:7, pp:122- [Journal]
  52. Peter G. Neumann
    What's in a Name? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:1, pp:186- [Journal]
  53. Peter G. Neumann
    Inside "Risks of Risks". [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:3, pp:160- [Journal]
  54. Peter G. Neumann
    Leap-Year Problems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:6, pp:162- [Journal]
  55. Peter G. Neumann
    Fraud by Computer. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:8, pp:154- [Journal]
  56. Peter G. Neumann
    Accidental Financial Losses. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:9, pp:194- [Journal]
  57. Peter G. Neumann
    Where to Place Trust. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:10, pp:138- [Journal]
  58. Peter G. Neumann
    Avoiding Weak Links. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:12, pp:146- [Journal]
  59. Peter G. Neumann
    Risks Considered Global(ly). [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:1, pp:154- [Journal]
  60. Peter G. Neumann
    Are Dependable Systems Feasible? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:2, pp:146- [Journal]
  61. Peter G. Neumann
    Risks of Technology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:3, pp:130- [Journal]
  62. Peter G. Neumann
    Using Names as Identifiers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:4, pp:154- [Journal]
  63. Peter G. Neumann
    The Role of Software Engineering. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:5, pp:114- [Journal]
  64. Peter G. Neumann
    Modeling and Simulation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:6, pp:124- [Journal]
  65. Peter G. Neumann
    Risks on the Rails. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:7, pp:130- [Journal]
  66. Peter G. Neumann
    Risks of Surveillance. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:8, pp:122- [Journal]
  67. Peter G. Neumann
    Animal Crackers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:9, pp:162- [Journal]
  68. Peter G. Neumann
    System Development Woes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:10, pp:146- [Journal]
  69. Peter G. Neumann
    Technology, Laws, and Society. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:3, pp:138- [Journal]
  70. Peter G. Neumann
    Risks of Passwords. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:4, pp:126- [Journal]
  71. Peter G. Neumann
    Alternative Passwords. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:146- [Journal]
  72. Peter G. Neumann
    Risks on the Information Superhighway. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:6, pp:114- [Journal]
  73. Peter G. Neumann
    Friendly Fire. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:8, pp:138- [Journal]
  74. Peter G. Neumann
    Expectations of Security and Privacy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:9, pp:138- [Journal]
  75. Peter G. Neumann
    Inside "Inside Risks". [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:12, pp:154- [Journal]
  76. Peter G. Neumann
    Reassessing the Crypto Debate. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:3, pp:138- [Journal]
  77. Peter G. Neumann
    Risks of Easy Answers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:9, pp:130- [Journal]
  78. Peter G. Neumann
    Reviewing the Risks Archives. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:138- [Journal]
  79. Peter G. Neumann
    Computer Vulnerabilities: Exploitation or Avoidance. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:6, pp:138- [Journal]
  80. Peter G. Neumann
    Risks in Digital Commerce. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:1, pp:154- [Journal]
  81. Peter G. Neumann
    Disinformation Theory. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:10, pp:138- [Journal]
  82. Peter G. Neumann
    Distributed Systems have Distributed Risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:11, pp:130- [Journal]
  83. Peter G. Neumann
    Risks of Anonymity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:12, pp:162- [Journal]
  84. Peter G. Neumann
    A Risks-related Bookshelf. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:4, pp:122- [Journal]
  85. Peter G. Neumann
    Linguistic Risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:5, pp:154- [Journal]
  86. Peter G. Neumann
    Using Formal Methods to Reduce Risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:7, pp:114- [Journal]
  87. Peter G. Neumann
    Hopes for Fewer Risks? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:2, pp:170- [Journal]
  88. Peter G. Neumann
    The Big Picture. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:5, pp:136- [Journal]
  89. Peter G. Neumann
    Identity-Ralated Misuse. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:7, pp:112- [Journal]
  90. Peter G. Neumann
    Crypto Key Management. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:8, pp:136- [Journal]
  91. Peter G. Neumann
    Integrity in Software Development. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:10, pp:144- [Journal]
  92. Peter G. Neumann
    System Development Woes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:12, pp:160- [Journal]
  93. Peter G. Neumann
    Protecting the Infrastructures. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:1, pp:128- [Journal]
  94. Peter G. Neumann
    Are Computers Addictive? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:3, pp:128- [Journal]
  95. Peter G. Neumann
    Internet Gambling. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:2, pp:112- [Journal]
  96. Peter G. Neumann
    Laptops in Congress? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:7, pp:128- [Journal]
  97. Peter G. Neumann
    Y2K Update. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:9, pp:128- [Journal]
  98. Peter G. Neumann
    Risks of E-Education. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:10, pp:136- [Journal]
  99. Peter G. Neumann
    Robust Open-Source Software. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:128- [Journal]
  100. Peter G. Neumann
    Information is a Double-Edged Sword. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:120- [Journal]
  101. Peter G. Neumann
    Risks of Insiders. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:12, pp:160- [Journal]
  102. Peter G. Neumann, Michael D. Byrne
    Disability-related risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:144- [Journal]
  103. Peter G. Neumann, Peter J. Denning
    W(h)ither Research and Education? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:2, pp:154- [Journal]
  104. Peter G. Neumann, Declan McCullagh
    Risks of Y2K. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:6, pp:144- [Journal]
  105. Peter G. Neumann, David Lorge Parnas
    Computers: boon or bane? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:3, pp:168- [Journal]
  106. Peter G. Neumann, Lauren Weinstein
    Risks of National Identity Cards. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:12, pp:176- [Journal]
  107. Peter G. Neumann, Lauren Weinstein
    Spam, Spam, Spam! [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:6, pp:112- [Journal]
  108. Peter G. Neumann, Lauren Weinstein
    Risks of Content Filtering. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:11, pp:152- [Journal]
  109. Lauren Weinstein, Peter G. Neumann
    Internet Risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:5, pp:144- [Journal]
  110. Lauren Weinstein, Peter G. Neumann
    Inside Risks: Risks of Panic. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:11, pp:152- [Journal]
  111. Peter G. Neumann
    Risks relating to system compositions. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:7, pp:120- [Journal]
  112. Peter G. Neumann, Lauren Weinstein
    Risks of RFID. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:5, pp:136- [Journal]
  113. Peter G. Neumann
    The foresight saga. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:9, pp:112- [Journal]
  114. Peter G. Neumann
    Widespread network failures. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:2, pp:112- [Journal]
  115. Peter G. Neumann
    A Note on Cyclic Permutation Error-Correcting Codes [Citation Graph (0, 0)][DBLP]
    Information and Control, 1962, v:5, n:1, pp:72-86 [Journal]
  116. Peter G. Neumann
    IC Online Exclusive Interview: Internet Security - Beyond Cryptography. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1999, v:3, n:2, pp:100- [Journal]
  117. Peter G. Neumann, T. R. N. Rao
    Error-Correcting Codes for Byte-Organized Arithmetic Processors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1975, v:24, n:3, pp:226-232 [Journal]
  118. Nancy G. Leveson, Peter G. Neumann
    Introduction to Special Issue on Software for Critical Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1993, v:19, n:1, pp:1-2 [Journal]
  119. Peter G. Neumann
    On Hierarchical Design of Computer Systems for Critical Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1986, v:12, n:9, pp:905-920 [Journal]
  120. Peter G. Neumann
    Risks of Untrustworthiness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:321-328 [Conf]
  121. Peter G. Neumann
    E-migrating risks? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:9, pp:120- [Journal]
  122. Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman
    Toward a safer and more secure cyberspace. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:128- [Journal]

  123. Computer-Related Risk Futures. [Citation Graph (, )][DBLP]


  124. Security kernels. [Citation Graph (, )][DBLP]


  125. Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. [Citation Graph (, )][DBLP]


  126. Reflections on systems trustworthiness. [Citation Graph (, )][DBLP]


  127. Internal surveillance, external risks. [Citation Graph (, )][DBLP]


  128. Reflections on computer-related risks. [Citation Graph (, )][DBLP]


  129. Risks of neglecting infrastructure. [Citation Graph (, )][DBLP]


  130. Inside risks - U.S. election after-math. [Citation Graph (, )][DBLP]


Search in 0.009secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002