The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

E. Eugene Schultz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy
    A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:3, pp:263-270 [Journal]
  2. Jesper M. Johansson, E. Eugene Schultz
    Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:2, pp:152-159 [Journal]
  3. Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen
    Analysis of vulnerabilities in Internet firewalls. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:214-232 [Journal]
  4. Thomas A. Longstaff, E. Eugene Schultz
    Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:1, pp:61-77 [Journal]
  5. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:1, pp:5-15 [Journal]
  6. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:101-112 [Journal]
  7. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:3, pp:201-211 [Journal]
  8. E. Eugene Schultz
    The Sorry State of Law Enforcement. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:4, pp:290-292 [Journal]
  9. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:4, pp:293-302 [Journal]
  10. E. Eugene Schultz
    Taking a stand on hackers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:382-384 [Journal]
  11. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:385-396 [Journal]
  12. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:6, pp:481-490 [Journal]
  13. E. Eugene Schultz
    A framework for understanding and predicting insider attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:6, pp:526-531 [Journal]
  14. E. Eugene Schultz
    The US Government bigger and better information security? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:578-580 [Journal]
  15. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:581-590 [Journal]
  16. E. Eugene Schultz
    The gap between cryptography and information security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:8, pp:674-67 [Journal]
  17. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:8, pp:677-688 [Journal]
  18. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:1, pp:4-13 [Journal]
  19. E. Eugene Schultz
    Internet security: what's in the future? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:2, pp:78-79 [Journal]
  20. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:2, pp:80-89 [Journal]
  21. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:176-187 [Journal]
  22. E. Eugene Schultz
    Why can't Microsoft stay out of the InfoSec headlines? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:270-272 [Journal]
  23. E. Eugene Schultz
    Attackers hit Web hosting servers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:273-283 [Journal]
  24. E. Eugene Schultz
    Pandora's Box: spyware, adware, autoexecution, and NGSCB. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:366-367 [Journal]
  25. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:368-377 [Journal]
  26. E. Eugene Schultz
    Security views: Online piracy battle heats up in US. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:464-473 [Journal]
  27. E. Eugene Schultz
    Patching Pandemonium. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:556-558 [Journal]
  28. E. Eugene Schultz
    Information security and the media. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:652-653 [Journal]
  29. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:654-663 [Journal]
  30. E. Eugene Schultz
    Security training and awareness - fitting a square peg in a round hole. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:1, pp:1-2 [Journal]
  31. E. Eugene Schultz
    Incident response teams need to change. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:87-88 [Journal]
  32. E. Eugene Schultz
    Worms and viruses: are we losing control? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:3, pp:179-180 [Journal]
  33. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:3, pp:181-190 [Journal]
  34. E. Eugene Schultz
    Intrusion prevention. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:4, pp:265-266 [Journal]
  35. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:4, pp:267-274 [Journal]
  36. E. Eugene Schultz
    Sarbanes-Oxley - a huge boon to information security in the US. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:5, pp:353-354 [Journal]
  37. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:5, pp:355-361 [Journal]
  38. E. Eugene Schultz
    The case for one-time credentials. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:6, pp:441-442 [Journal]
  39. E. Eugene Schultz
    The gap between cryptography and information security: has it narrowed? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:531-532 [Journal]
  40. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:533-541 [Journal]
  41. E. Eugene Schultz
    Is the U.S. government really getting serious about information security? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:621-622 [Journal]
  42. E. Eugene Schultz
    Search engines: a growing contributor to security risk. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:87-88 [Journal]
  43. E. Eugene Schultz
    Lycos crosses the line. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:89-90 [Journal]
  44. E. Eugene Schultz
    Security dilemmas with Microsoft's Internet Explorer. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:175-176 [Journal]
  45. E. Eugene Schultz
    Personal information compromises: It is time for the U.S. Government to wake up. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:4, pp:261-262 [Journal]
  46. E. Eugene Schultz
    Non-infosec professionals in infosec? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:347-348 [Journal]
  47. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:349-358 [Journal]
  48. E. Eugene Schultz
    The human factor in security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:425-426 [Journal]
  49. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:427-436 [Journal]
  50. E. Eugene Schultz
    Aligning disaster recovery and security incident response. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:505-506 [Journal]
  51. E. Eugene Schultz
    Infosec certification: Which way do we turn from here? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:8, pp:587-588 [Journal]
  52. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:8, pp:589-598 [Journal]
  53. E. Eugene Schultz
    Dilemmas and boundaries of digital rights management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:1, pp:1-2 [Journal]
  54. E. Eugene Schultz
    About "Unofficial patches". [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:79-80 [Journal]
  55. E. Eugene Schultz
    Special systems: Overlooked sources of security risk? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:155- [Journal]
  56. E. Eugene Schultz
    Representing information security fairly and accurately. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:4, pp:237- [Journal]
  57. E. Eugene Schultz
    Windows NT security: Kudos, concerns, and prescriptions. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:3, pp:204-210 [Journal]
  58. E. Eugene Schultz, Robert W. Proctor, Mei-Ching Lien, Gavriel Salvendy
    Usability and Security An Appraisal of Usability Issues in Information Security Methods. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:620-634 [Journal]
  59. E. Eugene Schultz
    Predicting the future of InfoSec. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:8, pp:553-554 [Journal]
  60. E. Eugene Schultz
    Microsoft is back in the hot seat. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:393-394 [Journal]
  61. E. Eugene Schultz
    The changing winds of information security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:315-316 [Journal]
  62. E. Eugene Schultz
    Issues concerning the distribution of vulnerability information. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:7, pp:475-476 [Journal]
  63. E. Eugene Schultz
    What infosec changes are likely to result from the recent US election? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:1, pp:1-2 [Journal]
  64. E. Eugene Schultz
    Windows Vista: Microsoft's brave new world. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:2, pp:99- [Journal]
  65. Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bhargav-Spantzel, Bik-Lam (Belin) Tai, Joshua Cook, E. Eugene Schultz
    Improving password security and memorability to protect personal and organizational information. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2007, v:65, n:8, pp:744-757 [Journal]

  66. Mobile computing: The next Pandora's Box. [Citation Graph (, )][DBLP]


  67. Struggles in the academic side of infosec. [Citation Graph (, )][DBLP]


Search in 0.035secs, Finished in 0.040secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002