Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
Discussion: strike back: offensive actions in information warfare
Proceedings of the 1999 workshop on New security paradigms
Attack propagation in networks
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Guest Editor's Introduction: High-Confidence Distributed Systems
IEEE Internet Computing
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
IEEE Transactions on Knowledge and Data Engineering
Authorization Based on Evidence and Trust
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
Evolving Finite-State Machine Strategies for Protecting Resources
ISMIS '00 Proceedings of the 12th International Symposium on Foundations of Intelligent Systems
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Breakthrough in privacy concerns and lawful access conflicts
Telematics and Informatics
Public telephone network vulnerabilities
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Integrating information security and intelligence courses
Security education and critical infrastructures
Evolution of strategies for resource protection problems
Advances in evolutionary computing
Teaching computer security at a small college
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
An incentive system for reducing malware attacks
Communications of the ACM - 3d hard copy
The deceptive behaviors that offend us most about spyware
Communications of the ACM - Spyware
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Storage-based intrusion detection: watching storage activity for suspicious behavior
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
An information-centric and proactive approach to Information Security teaching
International Journal of Information and Computer Security
Extending of IDS for detecting abnormal intrusion traffic simulations based on SSFNet
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Why is Security a Software Issue?
The EDP Audit, Control, and Security Newsletter
Information systems security and human behaviour
Behaviour & Information Technology
Improving the cyber incident mission impact assessment (CIMIA) process
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
On the importance of securing telephony systems
WSEAS TRANSACTIONS on COMMUNICATIONS
Modern telephony threats & countermeasures
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Identity theft and privacy – consumer awareness in Ireland
International Journal of Networking and Virtual Organisations
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs
Computer Communications
Performance adaptation in real-time intrusion detection systems
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Communications of the ACM
Storage-Based Intrusion Detection
ACM Transactions on Information and System Security (TISSEC)
Botnets: To what extent are they a threat to information security?
Information Security Tech. Report
From blitzkrieg to bitskrieg: the military encounter with computers
Communications of the ACM
Network Security
Windows Vista and digital investigations
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A two-dimensional circumplex approach to the development of a hacker taxonomy
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Data Base Management Systems (DBMSs): Meeting the requirements of the EU data protection legislation
International Journal of Information Management: The Journal for Information Professionals
The Ethics of Cyberweapons in Warfare
International Journal of Technoethics
Incident-centered information security: Managing a strategic balance between prevention and response
Information and Management
Hi-index | 0.03 |