Search the dblp DataBase
E. Eugene Schultz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael Frantzen , Florian Kerschbaum , E. Eugene Schultz , Sonia Fahmy A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:3, pp:263-270 [Journal ] Jesper M. Johansson , E. Eugene Schultz Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:2, pp:152-159 [Journal ] Seny Kamara , Sonia Fahmy , E. Eugene Schultz , Florian Kerschbaum , Michael Frantzen Analysis of vulnerabilities in Internet firewalls. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:3, pp:214-232 [Journal ] Thomas A. Longstaff , E. Eugene Schultz Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:1, pp:61-77 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:1, pp:5-15 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:2, pp:101-112 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:3, pp:201-211 [Journal ] E. Eugene Schultz The Sorry State of Law Enforcement. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:290-292 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:293-302 [Journal ] E. Eugene Schultz Taking a stand on hackers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:382-384 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:5, pp:385-396 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:6, pp:481-490 [Journal ] E. Eugene Schultz A framework for understanding and predicting insider attacks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:6, pp:526-531 [Journal ] E. Eugene Schultz The US Government bigger and better information security? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:578-580 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:581-590 [Journal ] E. Eugene Schultz The gap between cryptography and information security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:8, pp:674-67 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:8, pp:677-688 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:1, pp:4-13 [Journal ] E. Eugene Schultz Internet security: what's in the future? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:2, pp:78-79 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:2, pp:80-89 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:3, pp:176-187 [Journal ] E. Eugene Schultz Why can't Microsoft stay out of the InfoSec headlines? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:4, pp:270-272 [Journal ] E. Eugene Schultz Attackers hit Web hosting servers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:4, pp:273-283 [Journal ] E. Eugene Schultz Pandora's Box: spyware, adware, autoexecution, and NGSCB. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:5, pp:366-367 [Journal ] E. Eugene Schultz Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:5, pp:368-377 [Journal ] E. Eugene Schultz Security views: Online piracy battle heats up in US. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:464-473 [Journal ] E. Eugene Schultz Patching Pandemonium. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:7, pp:556-558 [Journal ] E. Eugene Schultz Information security and the media. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:652-653 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:654-663 [Journal ] E. Eugene Schultz Security training and awareness - fitting a square peg in a round hole. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:1, pp:1-2 [Journal ] E. Eugene Schultz Incident response teams need to change. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:2, pp:87-88 [Journal ] E. Eugene Schultz Worms and viruses: are we losing control? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:3, pp:179-180 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:3, pp:181-190 [Journal ] E. Eugene Schultz Intrusion prevention. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:4, pp:265-266 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:4, pp:267-274 [Journal ] E. Eugene Schultz Sarbanes-Oxley - a huge boon to information security in the US. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:5, pp:353-354 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:5, pp:355-361 [Journal ] E. Eugene Schultz The case for one-time credentials. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:6, pp:441-442 [Journal ] E. Eugene Schultz The gap between cryptography and information security: has it narrowed? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:7, pp:531-532 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:7, pp:533-541 [Journal ] E. Eugene Schultz Is the U.S. government really getting serious about information security? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:8, pp:621-622 [Journal ] E. Eugene Schultz Search engines: a growing contributor to security risk. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:2, pp:87-88 [Journal ] E. Eugene Schultz Lycos crosses the line. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:2, pp:89-90 [Journal ] E. Eugene Schultz Security dilemmas with Microsoft's Internet Explorer. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:3, pp:175-176 [Journal ] E. Eugene Schultz Personal information compromises: It is time for the U.S. Government to wake up. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:261-262 [Journal ] E. Eugene Schultz Non-infosec professionals in infosec? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:5, pp:347-348 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:5, pp:349-358 [Journal ] E. Eugene Schultz The human factor in security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:6, pp:425-426 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:6, pp:427-436 [Journal ] E. Eugene Schultz Aligning disaster recovery and security incident response. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:7, pp:505-506 [Journal ] E. Eugene Schultz Infosec certification: Which way do we turn from here? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:8, pp:587-588 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:8, pp:589-598 [Journal ] E. Eugene Schultz Dilemmas and boundaries of digital rights management. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:1, pp:1-2 [Journal ] E. Eugene Schultz About "Unofficial patches". [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:79-80 [Journal ] E. Eugene Schultz Special systems: Overlooked sources of security risk? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:3, pp:155- [Journal ] E. Eugene Schultz Representing information security fairly and accurately. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:4, pp:237- [Journal ] E. Eugene Schultz Windows NT security: Kudos, concerns, and prescriptions. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:3, pp:204-210 [Journal ] E. Eugene Schultz , Robert W. Proctor , Mei-Ching Lien , Gavriel Salvendy Usability and Security An Appraisal of Usability Issues in Information Security Methods. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:7, pp:620-634 [Journal ] E. Eugene Schultz Predicting the future of InfoSec. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:8, pp:553-554 [Journal ] E. Eugene Schultz Microsoft is back in the hot seat. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:393-394 [Journal ] E. Eugene Schultz The changing winds of information security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:5, pp:315-316 [Journal ] E. Eugene Schultz Issues concerning the distribution of vulnerability information. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:7, pp:475-476 [Journal ] E. Eugene Schultz What infosec changes are likely to result from the recent US election? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:1, pp:1-2 [Journal ] E. Eugene Schultz Windows Vista: Microsoft's brave new world. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:99- [Journal ] Kim-Phuong L. Vu , Robert W. Proctor , Abhilasha Bhargav-Spantzel , Bik-Lam (Belin) Tai , Joshua Cook , E. Eugene Schultz Improving password security and memorability to protect personal and organizational information. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2007, v:65, n:8, pp:744-757 [Journal ] Mobile computing: The next Pandora's Box. [Citation Graph (, )][DBLP ] Struggles in the academic side of infosec. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.487secs