The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephen Hinde: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen Hinde
    New Millennium, Old Failures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:119-127 [Journal]
  2. Stephen Hinde
    Life Was Simple Then. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:222-229 [Journal]
  3. Stephen Hinde
    Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:312-320 [Journal]
  4. Stephen Hinde
    Love Conquers All? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:408-420 [Journal]
  5. Stephen Hinde
    Fireworks, Beer and Old Halfpennies - The Risks of Assumption. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:499-504 [Journal]
  6. Stephen Hinde
    Do You Know Your Organization's Achilles Heel? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:585-590 [Journal]
  7. Stephen Hinde
    New Names For Old - A Personal Surf Through Compsec 200. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:679-687 [Journal]
  8. Stephen Hinde
    2001: A Privacy Odyssey. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:21-27 [Journal]
  9. Stephen Hinde
    The Search For Privacy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:2, pp:127-131 [Journal]
  10. Stephen Hinde
    The Times They Are A-Changin'. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:3, pp:202-206 [Journal]
  11. Stephen Hinde
    The Weakest Link. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:4, pp:295-301 [Journal]
  12. Stephen Hinde
    Cyberthreats: Perceptions, Reality and Protection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:5, pp:364-371 [Journal]
  13. Stephen Hinde
    Omnia te adversum spectantia, nulla retorsum*. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:6, pp:468-474 [Journal]
  14. Stephen Hinde
    Lessons Learned. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:561-567 [Journal]
  15. Stephen Hinde
    Incalculable potential for damage by cyber-terrorism. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:568-572 [Journal]
  16. Stephen Hinde
    If you can meet with triumph and disaster and treat those two impostors just the same.... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:8, pp:657-666 [Journal]
  17. Stephen Hinde
    2001: A Privacy Odyssey Revisited. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:1, pp:16-34 [Journal]
  18. Stephen Hinde
    It Was Déjá vu all Over Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:3, pp:212-21 [Journal]
  19. Stephen Hinde
    Security surveys spring crop. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:4, pp:310-321 [Journal]
  20. Stephen Hinde
    The perils of privacy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:424-432 [Journal]
  21. Stephen Hinde
    The Blue Screen of Death and other deadly bugs. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:6, pp:491-496 [Journal]
  22. Stephen Hinde
    Spam, scams, chains, hoaxes and other junk mail. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:592-606 [Journal]
  23. Stephen Hinde
    Compsec 2002: the complete security circle. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:8, pp:689-693 [Journal]
  24. Stephen Hinde
    Time cost$ money. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:1, pp:14-21 [Journal]
  25. Stephen Hinde
    The law, cybercrime, risk assessment and cyber protection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:2, pp:90-95 [Journal]
  26. Stephen Hinde
    Cyber-terrorism in context. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:188-192 [Journal]
  27. Stephen Hinde
    Careless about privacy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:284-288 [Journal]
  28. Stephen Hinde
    Privacy legislation: a comparison of the US and European approaches. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:378-387 [Journal]
  29. Stephen Hinde
    Spam: the evolution of a nuisance. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:474-478 [Journal]
  30. Stephen Hinde
    Nimbyism, dominoes and creaking infrastructure. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:570-576 [Journal]
  31. Stephen Hinde
    Computer security: Mapping the future. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:664-669 [Journal]
  32. Stephen Hinde
    Hot water, icebergs and other disasters. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:1, pp:31-33 [Journal]
  33. Stephen Hinde
    Cyber Wars and other threats. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:115-118 [Journal]
  34. Stephen Hinde
    Recent security surveys. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:207-210 [Journal]
  35. Stephen Hinde
    Contingency planning for the millenium. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:4, pp:299-302 [Journal]
  36. Stephen Hinde
    Solar radiation is bad for you. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:5, pp:385-388 [Journal]
  37. Stephen Hinde
    Privacy and security - The drivers for growth of E-Commerce. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:6, pp:475-478 [Journal]
  38. Stephen Hinde
    Corporate governance and disasters. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:7, pp:583-585 [Journal]
  39. Stephen Hinde
    Time, history and war: A personal voyage through Compsec '98. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:8, pp:671-681 [Journal]
  40. Stephen Hinde
    One down, one to go. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:1, pp:19-22 [Journal]
  41. Stephen Hinde
    Year 2000 update. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:2, pp:113-119 [Journal]
  42. Stephen Hinde
    Are you in control? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:3, pp:199-203 [Journal]
  43. Stephen Hinde
    E for exponential growth. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:4, pp:295-299 [Journal]
  44. Stephen Hinde
    E-mail can seriously damage your health. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:5, pp:396-406 [Journal]
  45. Stephen Hinde
    The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:565-572 [Journal]
  46. Stephen Hinde
    Step into a secure new world - Compsec '99 report. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:8, pp:660-669 [Journal]

Search in 0.034secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002