Synthesis of two-party error-recoverable protocols
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
Implications of data quality for spreadsheet analysis
ACM SIGMIS Database
The tea-leaf reader algorithm: an efficient implementation of CRC-16 and CRC-32
Communications of the ACM
The PIOCO model for information systems design
MIS Quarterly
Defending against viruses and worms
ACM SIGUCCS Newsletter
Viruses and worms - What can they do?
ACM SIGSAC Review
Representing and using nonfunctional requirements: a process-oriented approach
IEEE Transactions on Software Engineering - Special issue on knowledge representation and reasoning in software development
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Dealing with non-functional requirements: three experimental studies of a process-oriented approach
Proceedings of the 17th international conference on Software engineering
Optimal policy for batch operations: backup, checkpointing, reorganization, and updating
ACM Transactions on Database Systems (TODS)
SIGCSE '85 Proceedings of the sixteenth SIGCSE technical symposium on Computer science education
SIGCSE '85 Proceedings of the sixteenth SIGCSE technical symposium on Computer science education
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Orderly enumeration of nonsingular binary matrices applied to text encryption
Communications of the ACM
Representing and Using Nonfunctional Requirements: A Process-Oriented Approach
IEEE Transactions on Software Engineering - Special issue on knowledge representation and reasoning in software development
Computers and the law (An experimental undergraduate course)
SIGCSE '81 Proceedings of the twelfth SIGCSE technical symposium on Computer science education
Cost implications of privacy protection in databank systems
ACM SIGMIS Database
The protection of computer facilities and equipment: physical security
ACM SIGMIS Database
Costoptimal reliability of data processing systems
ACM SIGMETRICS Performance Evaluation Review
A seminar in computer audit and control systems
ACM SIGSAC Review - Fertile topics in security, audit, and control
A capsule view of data security for the data processing manager
ACM SIGCSIM Installation Management Review
The Dark Side of Computing: SRI International and the Study of Computer Crime
IEEE Annals of the History of Computing
Security risk assessment in electronic data processing systems
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
Problem areas in computer security assessment
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Computer network cryptography engineering
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Cryptography using modular software elements
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
Impacts of information system vulnerabilities on society
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
On Some Issues of Information Resource Management in the 1990s
Information Resources Management Journal
A novel approach to evaluate software vulnerability prioritization
Journal of Systems and Software
Hi-index | 0.04 |