Inside risks: a risks-related bookshelf
Communications of the ACM
Web-based testing: A study in insecurity
World Wide Web
Security education and critical infrastructures
IEEE Security and Privacy
A methodology for developing trusted information systems: the security requirements analysis phase
Current security management & Ethical issues of information technology
Password security: an empirical study
Journal of Management Information Systems
Threats and countermeasures for information system security: A cross-industry study
Information and Management
Information Systems Security
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Attacks against computer network: formal grammar-based framework and simulation tool
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
System Assurance: Beyond Detecting Vulnerabilities
System Assurance: Beyond Detecting Vulnerabilities
Self-reported computer criminal behavior: A psychological analysis
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.02 |