Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
On the functional relation between security and dependability impairments
Proceedings of the 1999 workshop on New security paradigms
Reflection as a mechanism for software integrity verification
ACM Transactions on Information and System Security (TISSEC)
Using information security as a response to competitor analysis systems
Communications of the ACM
Checklist-based risk analysis with evidential reasoning
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
An Approach to Mobile Software Robots for the WWW
IEEE Transactions on Knowledge and Data Engineering
Risk Assessment & Success Factors for e-Government in a UK Establishment
EGOV '02 Proceedings of the First International Conference on Electronic Government
A Secure Communication Scheme for Multiagent Systems
PRIMA '98 Selected papers from the First Pacific Rim International Workshop on Multi-Agents, Multiagent Platforms
Designing Secure Integration Architectures
ICCBSS '03 Proceedings of the Second International Conference on COTS-Based Software Systems
Model-Based Tool-Assistance for Packet-Filter Design
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
The Integration of Safety and Security Requirements
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
The Role of the Development Process in Operating System Security
ISW '00 Proceedings of the Third International Workshop on Information Security
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
Managing e-business: security issues and solutions
Managing web usage in the workplace
Cellular automata based authentication (CAA)
ICCC '02 Proceedings of the 15th international conference on Computer communication
Anomaly intrusion detection in dynamic execution environments
Proceedings of the 2002 workshop on New security paradigms
Security issues for wireless ATM networks
ACM SIGOPS Operating Systems Review
Public telephone network vulnerabilities
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Information security fundamentals
Security education and critical infrastructures
A dedicated undergraduate track in computer security education
Security education and critical infrastructures
Task-role-based access control model
Information Systems
Designing high integrity systems using aspects
Integrity and internal control in information systems V
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
Secret key distribution protocol using public key cryptography
Journal of Computing Sciences in Colleges
Information security management: a new paradigm
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Protecting intellectual property in IT layoffs: legal and security issues
Technologies & methodologies for evaluating information technology in business
The emerging need for e-commerce accepted practice (ECAP)
The economic and social impacts of e-commerce
An undergraduate track in computer security
Proceedings of the 8th annual conference on Innovation and technology in computer science education
Security in the Web Services Framework
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Visualizing windows executable viruses using self-organizing maps
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
A Management Perspective on Risk of Security Threats to Information Systems
Information Technology and Management
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
Competitor analysis and its defenses in the e-marketplace
Communications of the ACM - Spyware
Information assurance in the undergraduate curriculum
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Password security: an empirical study
Journal of Management Information Systems
Trustworthy software systems: a discussion of basic concepts and terminology
ACM SIGSOFT Software Engineering Notes
The Journal of Supercomputing
A framework model for grid security
Future Generation Computer Systems
Science of Computer Programming
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Future Generation Computer Systems
A comparison of methods for implementing adaptive security policies
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
WCAE '03 Proceedings of the 2003 workshop on Computer architecture education: Held in conjunction with the 30th International Symposium on Computer Architecture
ACM Communications in Computer Algebra
On-line data protecting via pseudo random binary sequences
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
FPGA based communication security for wireless sensor networks
ESPOCO'05 Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and Control
Integration QoS and security technologies in 4G mobile networks
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Security metrics for source code structures
Proceedings of the fourth international workshop on Software engineering for secure systems
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
The Good and Not So Good of Enforcing Password Composition Rules
Information Systems Security
Information Systems Security
Techniques for Design and Implementation of Secure Reconfigurable PUFs
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
A new cryptographic algorithm for the real time applications
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Security in dynamic web content management systems applications
Communications of the ACM - Finding the Fun in Computer Science Education
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Extreme programming security practices
XP'07 Proceedings of the 8th international conference on Agile processes in software engineering and extreme programming
Foundations of security analysis and design IV
Dependability metrics
ICONIP'08 Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I
A first step towards security policy compliance of connectors
FSEN'09 Proceedings of the Third IPM international conference on Fundamentals of Software Engineering
An electronic reconfigurable neural architecture for intrusion detection
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Problem frames and architectures for security problems
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
Data protection based on physical separation: concepts and application scenarios
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
An algebraic basis for specifying and enforcing access control in security systems
IW-FM'00 Proceedings of the 4th Irish conference on Formal Methods
Enhancing optimistic access controls with usage control
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Theorizing Information Security Success: Towards Secure E-Government
International Journal of Electronic Government Research
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
Information Resources Management Journal
Hi-index | 0.02 |