CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Fundamentals of computer security technology
Fundamentals of computer security technology
The risks of key recovery, key escrow, and trusted third-party encryption
World Wide Web Journal - Special issue: Web security: a matter of trust
Net Security: Your Digital Doberman: Sure-Fire Strategies for Wired Businesses
Net Security: Your Digital Doberman: Sure-Fire Strategies for Wired Businesses
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Attack net penetration testing
Proceedings of the 2000 workshop on New security paradigms
Proceedings of the 2002 ACM symposium on Applied computing
Organizational Modeling for Efficient Specification of Information Security Requirements
ADBIS '99 Proceedings of the Third East European Conference on Advances in Databases and Information Systems
Modelling Trust for System Design Using the i* Strategic Actors Framework
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
Communications of the ACM - Homeland security
Ubiquitous security for ubiquitous computing
Information Security Tech. Report
Journal of Systems and Software
Assessing the risk of intercepting VoIP calls
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cooperative Visualization of Privacy Risks
CDVE '08 Proceedings of the 5th international conference on Cooperative Design, Visualization, and Engineering
A vulnerability recommendation system in Linux kernel variables
FUZZ-IEEE'09 Proceedings of the 18th international conference on Fuzzy Systems
Detecting fraud in online games of chance and lotteries
Expert Systems with Applications: An International Journal
Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk
ACM Transactions on Software Engineering and Methodology (TOSEM)
Applying a reusable election threat model at the county level
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Hi-index | 0.00 |