The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bill Hancock: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bill Hancock
    However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:666-667 [Journal]
  2. Bill Hancock
    China Relaxes Encryption Rules. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:215-215 [Journal]
  3. Bill Hancock
    New Classes of Unix/Linux Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:570-571 [Journal]
  4. Bill Hancock
    American Express Creates Disposable Credit Card Number. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:571-572 [Journal]
  5. Bill Hancock
    Microsoft Releases New IIS Security Tool. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:572-572 [Journal]
  6. Bill Hancock
    Baltimore Releases Security Developer Freeware. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:572-573 [Journal]
  7. Bill Hancock
    `Files Streams' Virus Infects in an Old and New Way. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:573-574 [Journal]
  8. Bill Hancock
    Trinity v3, a DDoS Tool, Hits the Streets. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:574-574 [Journal]
  9. Bill Hancock
    Hacker Insurance Now Part of the Business Risk Management Kit. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:574-575 [Journal]
  10. Bill Hancock
    Wireless Crazed? No Security For You! [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:575-577 [Journal]
  11. Bill Hancock
    White House Supporting Open Source Code. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:577-578 [Journal]
  12. Bill Hancock
    White House Security Summit Builds Towards a B2B Security Standard. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:578-579 [Journal]
  13. Bill Hancock
    Cellular Security Hazards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:579-579 [Journal]
  14. Bill Hancock
    UK Fuel Taxes Protestor Accused of Mass Hacking. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:580-580 [Journal]
  15. Bill Hancock
    US Government Board Setting Up Security Metrics. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:580-580 [Journal]
  16. Bill Hancock
    Privacy Group Wants `Web Bugs' Disclosures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:581-581 [Journal]
  17. Bill Hancock
    Site Spoofing Becomes More Popular. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:581-583 [Journal]
  18. Bill Hancock
    First PDA Virus Hits the Airwaves. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:583-584 [Journal]
  19. Bill Hancock
    From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:664-665 [Journal]
  20. Bill Hancock
    Feeling Sorry for Microsoft? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:665-666 [Journal]
  21. Bill Hancock
    Wireless Big Brother. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:667-668 [Journal]
  22. Bill Hancock
    NASA Hacker Pleads Guilty. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:668-669 [Journal]
  23. Bill Hancock
    Canadian Teen Mafiaboy Pleads Guilty. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:669-669 [Journal]
  24. Bill Hancock
    Getting the Laws to Help Combat Cybercrime (There's a grand idea). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:669-670 [Journal]
  25. Bill Hancock
    Internet Biz Group Calls for Cybercrime Treaty Delay. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:671-671 [Journal]
  26. Bill Hancock
    Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:671-673 [Journal]
  27. Bill Hancock
    Hacktivism Increasing. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:673-674 [Journal]
  28. Bill Hancock
    US Department of Defense Prepares Cybercrime Database. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:674-674 [Journal]
  29. Bill Hancock
    CIA Chat Room Causes Grief. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:674-676 [Journal]
  30. Bill Hancock
    Japan Creates Cyberconditions for IT National Revolution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:676-677 [Journal]
  31. Bill Hancock
    US Privacy Law Proposals Cause Concerns. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:677-678 [Journal]
  32. Bill Hancock
    Y2K & Security A Low Priority Year. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:4-5 [Journal]
  33. Bill Hancock
    Voodoo is Alive and Well on Your Computer. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:5-6 [Journal]
  34. Bill Hancock
    Hand-held Virii On The Way. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:6-7 [Journal]
  35. Bill Hancock
    China Passes Law to Promote Internet Security Supposedly. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:7-7 [Journal]
  36. Bill Hancock
    Smarter Marines. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:7-7 [Journal]
  37. Bill Hancock
    E-tailers Batten Down the Hatches. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:8-8 [Journal]
  38. Bill Hancock
    Information Warfare Highlighted as a Concern by US Government. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:8-9 [Journal]
  39. Bill Hancock
    E-mail Spammers Jailed. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:9-10 [Journal]
  40. Bill Hancock
    The Chief Security Officer's Top Ten List for 2001. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:10-14 [Journal]
  41. Bill Hancock
    `Safe Harbor' Provision Adopters Few and Far Between. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:14-15 [Journal]
  42. Bill Hancock
    The Wireless Great Divide But Getting Smaller. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:15-17 [Journal]
  43. Bill Hancock
    It's a Privacy Thing in 2001. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:17-18 [Journal]
  44. Bill Hancock
    Fighting SPAM in Europe. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:18-19 [Journal]
  45. Bill Hancock
    Privacy Advocates Grow in Europe. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:19-20 [Journal]
  46. Bill Hancock
    A Practical Risk. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:2, pp:98-126 [Journal]
  47. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:3, pp:188-201 [Journal]
  48. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:4, pp:278-294 [Journal]
  49. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:5, pp:348-363 [Journal]
  50. Bill Hancock
    U.S. DoD Puts Up Blocks to Code Red. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:6, pp:451-467 [Journal]
  51. Bill Hancock
    Security View. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:546-560 [Journal]
  52. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:8, pp:643-656 [Journal]
  53. Bill Hancock
    Security crisis management the basics. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:397-401 [Journal]
  54. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:1, pp:2-4 [Journal]
  55. Bill Hancock
    Security goes prime-time. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:1, pp:5-13 [Journal]
  56. Bill Hancock
    From the Editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:96-97 [Journal]
  57. Bill Hancock
    Who do you call for, CISSP. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:99-109 [Journal]
  58. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:190-191 [Journal]
  59. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:192-200 [Journal]
  60. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:4, pp:278-279 [Journal]
  61. Bill Hancock
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:4, pp:280-292 [Journal]
  62. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:5, pp:368-369 [Journal]
  63. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:6, pp:460-461 [Journal]
  64. Bill Hancock
    Security tradeshows - Good or bad? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:6, pp:462-474 [Journal]
  65. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:7, pp:562-563 [Journal]
  66. Bill Hancock
    Windows-98, RIP and my Adrenaline Rush. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:7, pp:564-574 [Journal]
  67. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:8, pp:652-653 [Journal]
  68. Bill Hancock
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:8, pp:654-666 [Journal]
  69. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:1, pp:2-3 [Journal]
  70. Bill Hancock
    Elliptical curve cryptography and standards for efficient cryptography group. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:1, pp:4-15 [Journal]
  71. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:2, pp:88-89 [Journal]
  72. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:3, pp:182-183 [Journal]
  73. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:4, pp:276-277 [Journal]
  74. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:5, pp:370-371 [Journal]
  75. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:6, pp:456-457 [Journal]
  76. Bill Hancock
    From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:550-552 [Journal]
  77. Bill Hancock
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:553-564 [Journal]
  78. Bill Hancock
    Wireless Ubiquity for E-Biz. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:403-403 [Journal]
  79. Bill Hancock
    And Now, the Bug-in-Your-Site Award Goes To.... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:404-404 [Journal]
  80. Bill Hancock
    Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:404-405 [Journal]
  81. Bill Hancock
    G8 Thinks About Cybercrime (It's About Time, Too). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:405-407 [Journal]
  82. Bill Hancock
    A Need for a Network Security Czar. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:476-477 [Journal]
  83. Bill Hancock
    US Government Fighting for Expanded Wiretap Laws. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:477-477 [Journal]
  84. Bill Hancock
    E-Commerce Paranoia: Flaws in Code. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:477-479 [Journal]
  85. Bill Hancock
    Truly Certified: Security Certifications Updat. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:479-480 [Journal]
  86. Bill Hancock
    Digital Certificates Get Creative. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:480-487 [Journal]
  87. Bill Hancock
    Health Care Security: A Hard Look at a Growing Problem. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:482-482 [Journal]
  88. Bill Hancock
    Safeway UK's Website Shut Down. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:483-483 [Journal]
  89. Bill Hancock
    Philippine Government Creates Incident Response Team. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:483-483 [Journal]
  90. Bill Hancock
    DDoS Defence Gets Regulatory. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:483-485 [Journal]
  91. Bill Hancock
    Visa's Ten Commandments for E-Security Online. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:485-486 [Journal]
  92. Bill Hancock
    `Porngate'? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:486-487 [Journal]
  93. Bill Hancock
    What You Sell Online in France Could Be Restricted.... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:487-487 [Journal]
  94. Bill Hancock
    Hackers Still Love to Attack the Pentago. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:488-488 [Journal]
  95. Bill Hancock
    Spying At Home: A New Pastime to Detect Online Romanc. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:488-491 [Journal]
  96. Bill Hancock
    Is a Convicted Hacker Really Reformed and Should You Hire Them? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:491-493 [Journal]
  97. Bill Hancock
    DefCon Recruiting JamFest. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:493-494 [Journal]
  98. Bill Hancock
    Hacker Target: Mobile Phones. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:494-495 [Journal]
  99. Bill Hancock
    E-Mail Privacy Issues Escalate. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:495-495 [Journal]
  100. Bill Hancock
    GeoCities Ordered to Report on Information Poste. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:495-496 [Journal]
  101. Bill Hancock
    Hackers Breach Firewall. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:496-497 [Journal]
  102. Bill Hancock
    Lotus Domino Holes Up. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:497-498 [Journal]
  103. Bill Hancock
    Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:6-7 [Journal]
  104. Bill Hancock
    Cell Phone Crypto Cracked. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:7-8 [Journal]
  105. Bill Hancock
    Clinton's Proposed Crypto Regulations Under Attack. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:8-9 [Journal]
  106. Bill Hancock
    Overhauling the National Security Agency? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:9-10 [Journal]
  107. Bill Hancock
    Down Under, Hacking Private Computers by the Government is Legal. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:10-12 [Journal]
  108. Bill Hancock
    The "S" in SAP Doesn't Stand for Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:12-13 [Journal]
  109. Bill Hancock
    New York Times Fires Employees for Violating Internal E-mail Policies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:12-12 [Journal]
  110. Bill Hancock
    `Anonymizing' Software Causes Law Enforcement Concerns. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:13-14 [Journal]
  111. Bill Hancock
    Melissa Virus Creator Pleads Guilty. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:13-13 [Journal]
  112. Bill Hancock
    Security Problems Go Mobile In Your Next Car. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:14-16 [Journal]
  113. Bill Hancock
    The L0pht Goes Corporate and becomes @Stake. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:16-17 [Journal]
  114. Bill Hancock
    Alliance Formed to Fight Internet Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:108-109 [Journal]
  115. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:108-108 [Journal]
  116. Bill Hancock
    Code Paranoia about FBI Offerings to Detect DoS Infiltration. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:109-110 [Journal]
  117. Bill Hancock
    CIA says Russia and China are Building CyberSpy Organization. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:110-111 [Journal]
  118. Bill Hancock
    The SEC Hires CyberInvestigators to Search for Fraud. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:111-111 [Journal]
  119. Bill Hancock
    FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:111-113 [Journal]
  120. Bill Hancock
    Industry Teaming on ISACs. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:113-113 [Journal]
  121. Bill Hancock
    In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:113-114 [Journal]
  122. Bill Hancock
    Mafiaboy Hacker Eyed In Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:114-115 [Journal]
  123. Bill Hancock
    Japan Web Hackers Use Chinese and US Servers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:115-115 [Journal]
  124. Bill Hancock
    US Pentagon Defense Messaging System Shows Deficiencies in Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:116-117 [Journal]
  125. Bill Hancock
    Y2Hack Get-Together in Israel Under Political Attack. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:116-116 [Journal]
  126. Bill Hancock
    Security Managers Cite Need for Real-Time Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:117-117 [Journal]
  127. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:202-203 [Journal]
  128. Bill Hancock
    Network Warfare On The Rise. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:203-204 [Journal]
  129. Bill Hancock
    FBI Source Convicted of Hackin. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:204-205 [Journal]
  130. Bill Hancock
    Microsoft "Whistler" Release Posted to Internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:205-206 [Journal]
  131. Bill Hancock
    US Senate Passes Bill to Tighten Up Government Network. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:206-207 [Journal]
  132. Bill Hancock
    Cyberpatrol Reverse Engineering: Round 2. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:207-207 [Journal]
  133. Bill Hancock
    First Cybercrime Task Force City - Pittsburgh. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:208-208 [Journal]
  134. Bill Hancock
    US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:208-208 [Journal]
  135. Bill Hancock
    More on the January, 2000, NSA Computer Problems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:209-211 [Journal]
  136. Bill Hancock
    Mexico's President Under Cyberattack - Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:211-211 [Journal]
  137. Bill Hancock
    Another Insider Job on Wall Stree. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:211-212 [Journal]
  138. Bill Hancock
    FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:212-212 [Journal]
  139. Bill Hancock
    USDOJ Goes Prime Time With Cybercrime Web Sit. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:212-213 [Journal]
  140. Bill Hancock
    EU and US Reach Agreement on Privacy Issues. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:213-214 [Journal]
  141. Bill Hancock
    Warning from the US Government: Companies Get Secure or... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:214-215 [Journal]
  142. Bill Hancock
    French Card Forgery Note Could Work. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:216-216 [Journal]
  143. Bill Hancock
    US Law Enforcement Needs You! [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:216-217 [Journal]
  144. Bill Hancock
    UK Law Enforcement Bemoans Criminal Activities on Interne. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:217-218 [Journal]
  145. Bill Hancock
    Intel Creates New Plans for Notebook Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:218-218 [Journal]
  146. Bill Hancock
    Kevin Mitnick Gets His Day in Congres. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:218-219 [Journal]
  147. Bill Hancock
    Web Site Owners Seek Security People Apply Now! [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:219-220 [Journal]
  148. Bill Hancock
    Generation X Hackers? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:220-221 [Journal]
  149. Bill Hancock
    Suspected Hackers Arrested in Russian Credit-Card Fraud. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:296-296 [Journal]
  150. Bill Hancock
    Intel Eliminates ID from New Chips. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:296-297 [Journal]
  151. Bill Hancock
    European Parliament Doesn't Like Anonymity Online. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:297-297 [Journal]
  152. Bill Hancock
    DOD Finds Plans Online Reserve Unit Assesses Risk. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:297-298 [Journal]
  153. Bill Hancock
    Agencies Are "Own Worst Enemy". [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:298-298 [Journal]
  154. Bill Hancock
    US Department of Energy Security Criticized - Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:298-300 [Journal]
  155. Bill Hancock
    This is What Happens When You Lose Your Computer With Classified Data On It.... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:300-301 [Journal]
  156. Bill Hancock
    Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:301-302 [Journal]
  157. Bill Hancock
    Justice Department Conducting Criminal Probe in Former CIA Director Activities. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:302-303 [Journal]
  158. Bill Hancock
    Apache Site Defaced. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:303-305 [Journal]
  159. Bill Hancock
    US and Europe Cybercrime Agreement Problems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:306-307 [Journal]
  160. Bill Hancock
    Cyberstalking on the Rise. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:307-308 [Journal]
  161. Bill Hancock
    Large Child Pornography Ring Busted in Texas. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:308-309 [Journal]
  162. Bill Hancock
    New Denial of Service Attack on Internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:309-310 [Journal]
  163. Bill Hancock
    US Supreme Court Confirms ISPs Not Liable in E-mail Messages. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:310-310 [Journal]
  164. Bill Hancock
    Software Scam - 17 Indicted. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:310-311 [Journal]
  165. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:382-383 [Journal]
  166. Bill Hancock
    "I Agree" Legal Agreements Get Legislated. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:383-384 [Journal]
  167. Bill Hancock
    The US Government Tells Its Users to Clean Up Their E-mail. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:385-387 [Journal]
  168. Bill Hancock
    Home PC's Targeted by Hackers (Duh!). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:387-388 [Journal]
  169. Bill Hancock
    CIO's Get Serious About Best Security Practices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:388-388 [Journal]
  170. Bill Hancock
    Yahoo Faces Identity Crisis. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:389-389 [Journal]
  171. Bill Hancock
    Microsoft a Popular Virus Target Due to Ubiquity. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:389-391 [Journal]
  172. Bill Hancock
    UK's RIP Bill Creates Official Snooping. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:391-392 [Journal]
  173. Bill Hancock
    Extortion Going Online. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:392-393 [Journal]
  174. Bill Hancock
    Office 2000 Patch Recommended by CERT. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:393-393 [Journal]
  175. Bill Hancock
    Self-Regulation for Privacy Doesn't Work Says FTC. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:393-394 [Journal]
  176. Bill Hancock
    ...But the Industry Wants Self-Regulation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:394-395 [Journal]
  177. Bill Hancock
    US Senate Wakes Up to Need for Cybertools for Law Enforcers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:395-396 [Journal]
  178. Bill Hancock
    PGP V5.0 Keys Potentially Insecure. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:396-397 [Journal]
  179. Bill Hancock
    Canadian Credit Card Conundrum Caused by a Cracker. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:397-398 [Journal]
  180. Bill Hancock
    Suspect Charged in `Love Bug' Worm has Charges Dropped. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:398-398 [Journal]
  181. Bill Hancock
    Network Solutions Re-evaluates Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:398-400 [Journal]
  182. Bill Hancock
    CMU Sets Up a Sister to CERT. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:400-401 [Journal]
  183. Bill Hancock
    Speedy Response Yields Success at DOE. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:401-401 [Journal]
  184. Bill Hancock
    AOL Gets Busted - Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:402-402 [Journal]
  185. Bill Hancock
    Who's to Blame? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:402-403 [Journal]

Search in 0.111secs, Finished in 0.119secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002