Communications of the ACM
Communications of the ACM - Adaptive complex enterprises
Is Information Security Under Control?: Investigating Quality in Information Security Management
IEEE Security and Privacy
Refinement: A Constructive Approach to Formal Software Design for a Secure e-voting Interface
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 48.23 |
The challenge of applying protection to systems, software, and networks with intrinsic vulnerabilities is a lofty, but ultimately realizable, one.