The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Harold Joseph Highland: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Harold Joseph Highland
    Perspectives in Information Technology Security. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:440-446 [Conf]
  2. Guy G. Gable, Harold Joseph Highland
    Information Security in the Small Systems Context: A Framework for Understanding. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:37-51 [Conf]
  3. Harold Joseph Highland
    A View of Information Security Tomorrow. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:1-11 [Conf]
  4. Harold Joseph Highland
    IFIP/SEC'97 conference proceedings. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:3, pp:205- [Journal]
  5. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:4, pp:266-275 [Journal]
  6. Harold Joseph Highland
    The threats on the web. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:5, pp:365-368 [Journal]
  7. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:1, pp:4-16 [Journal]
  8. Harold Joseph Highland
    Data encryption: A non-mathematical approach. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:5, pp:369-386 [Journal]
  9. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:2, pp:92-100 [Journal]
  10. Harold Joseph Highland
    Historical bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:5, pp:387-411 [Journal]
  11. Harold Joseph Highland
    A non-mathematical view of encryption. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:3, pp:184-188 [Journal]
  12. Harold Joseph Highland
    A history of computer viruses - Introduction. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:5, pp:412-415 [Journal]
  13. Harold Joseph Highland
    Evaluating an encryption package. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:3, pp:189-190 [Journal]
  14. Harold Joseph Highland
    A history of computer viruses - The famous 'trio'. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:5, pp:416-429 [Journal]
  15. Harold Joseph Highland
    Computers under attack. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:3, pp:190-191 [Journal]
  16. Harold Joseph Highland
    A history of computer viruses: Three special viruses. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:5, pp:430-438 [Journal]
  17. Harold Joseph Highland
    Microcomputer utilities. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:3, pp:191-195 [Journal]
  18. Harold Joseph Highland
    Procedures to reduce the computer virus threat. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:5, pp:439-449 [Journal]
  19. Harold Joseph Highland
    NTIS volumes of interest. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:3, pp:195-198 [Journal]
  20. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:5, pp:384-397 [Journal]
  21. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:6, pp:486-495 [Journal]
  22. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:7, pp:586-600 [Journal]
  23. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:8, pp:690-699 [Journal]
  24. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:1, pp:4-15 [Journal]
  25. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:110-120 [Journal]
  26. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:3, pp:200-209 [Journal]
  27. Harold Joseph Highland
    The security impact of networks, telecommunications, and office automation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:3, pp:227-232 [Journal]
  28. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:4, pp:294-306 [Journal]
  29. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:5, pp:390-406 [Journal]
  30. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:6, pp:498-507 [Journal]
  31. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:7, pp:592-601 [Journal]
  32. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:8, pp:682-694 [Journal]
  33. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:1, pp:4-14 [Journal]
  34. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:2, pp:106-116 [Journal]
  35. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:3, pp:216-224 [Journal]
  36. Harold Joseph Highland
    Conference report. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:3, pp:249-253 [Journal]
  37. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:5, pp:424-433 [Journal]
  38. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:6, pp:518-526 [Journal]
  39. Harold Joseph Highland
    IFIP/Sec '93 conference report. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:6, pp:550-555 [Journal]
  40. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:7, pp:612-622 [Journal]
  41. Harold Joseph Highland
    A view of information security tomorrow. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:7, pp:634-639 [Journal]
  42. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:8, pp:698-709 [Journal]
  43. Harold Joseph Highland
    16th national computer security conference. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:8, pp:730-734 [Journal]
  44. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:1, pp:4-14 [Journal]
  45. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:2, pp:98-106 [Journal]
  46. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:3, pp:192-205 [Journal]
  47. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:4, pp:278-286 [Journal]
  48. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:5, pp:372-378 [Journal]
  49. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:6, pp:458-465 [Journal]
  50. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:540-546 [Journal]
  51. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:8, pp:622-627 [Journal]
  52. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:1, pp:4-13 [Journal]
  53. Harold Joseph Highland
    Random Bits & Bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:2, pp:90-102 [Journal]
  54. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:3, pp:188-196 [Journal]
  55. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:4, pp:274-282 [Journal]
  56. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:365-371 [Journal]
  57. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:6, pp:480-488 [Journal]
  58. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:7, pp:574-585 [Journal]
  59. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:8, pp:660-666 [Journal]
  60. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:1, pp:4-11 [Journal]
  61. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:2, pp:90-99 [Journal]
  62. Harold Joseph Highland
    Random Bits & Bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:3, pp:184-197 [Journal]
  63. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:4, pp:270-280 [Journal]
  64. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:5, pp:356-366 [Journal]
  65. Harold Joseph Highland
    IFIP TC 11 news. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:5, pp:387-390 [Journal]
  66. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:6, pp:458-469 [Journal]
  67. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:7, pp:552-560 [Journal]
  68. Harold Joseph Highland
    Passwords, the web, and the internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:8, pp:654- [Journal]
  69. Harold Joseph Highland
    Pornography and privacy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:8, pp:654-655 [Journal]
  70. Harold Joseph Highland
    It's a web browser! No, it's a weapon! [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:8, pp:655-656 [Journal]
  71. Harold Joseph Highland
    Internet/web directory. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:8, pp:656-657 [Journal]
  72. Harold Joseph Highland
    The enemy within. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:8, pp:657- [Journal]
  73. Harold Joseph Highland
    Ntis volumes of interest. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:8, pp:658-660 [Journal]
  74. Harold Joseph Highland
    Random bits & bytes & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:1, pp:4-13 [Journal]
  75. Harold Joseph Highland
    Current literature The 19th National Information Systems Security Conference. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:1, pp:47-59 [Journal]

  76. Random bits & bytes. [Citation Graph (, )][DBLP]


  77. Random bits & bytes. [Citation Graph (, )][DBLP]


  78. Random bits & bytes. [Citation Graph (, )][DBLP]


  79. Random bits & bytes. [Citation Graph (, )][DBLP]


  80. Random bits & bytes. [Citation Graph (, )][DBLP]


  81. Random bits & bytes. [Citation Graph (, )][DBLP]


  82. Random bits & bytes. [Citation Graph (, )][DBLP]


  83. Random bits & bytes. [Citation Graph (, )][DBLP]


  84. Random bits & bytes. [Citation Graph (, )][DBLP]


  85. Random bits & bytes. [Citation Graph (, )][DBLP]


  86. Reports from the victims. [Citation Graph (, )][DBLP]


  87. Secret disk II - administrator. [Citation Graph (, )][DBLP]


  88. From the editor. [Citation Graph (, )][DBLP]


  89. Random bits & bytes. [Citation Graph (, )][DBLP]


  90. From the editor. [Citation Graph (, )][DBLP]


  91. From the editor. [Citation Graph (, )][DBLP]


  92. Random bits & bytes. [Citation Graph (, )][DBLP]


  93. From the editor. [Citation Graph (, )][DBLP]


  94. From the editor. [Citation Graph (, )][DBLP]


  95. Random bits & bytes. [Citation Graph (, )][DBLP]


  96. Datacrime virus and new anti-virus products. [Citation Graph (, )][DBLP]


  97. From the editor. [Citation Graph (, )][DBLP]


  98. Random bits & bytes. [Citation Graph (, )][DBLP]


  99. Random bits & bytes. [Citation Graph (, )][DBLP]


  100. VCHECKER - a virus search program. [Citation Graph (, )][DBLP]


  101. Random bits & bytes. [Citation Graph (, )][DBLP]


  102. From the editor. [Citation Graph (, )][DBLP]


Search in 0.009secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002