Security management--“hey! How do you steer this thing?”
ACM SIGSAC Review
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Virtue vs. utility: alternative foundations for computer ethics
ECA '94 Proceedings of the conference on Ethics in the computer age
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Security Issues in Mobile Code Systems
Mobile Agents and Security
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Encyclopedia of Computer Science
Encyclopedia of Computer Science
Encyclopedia of Computer Science
Catching spam before it arrives: domain specific dynamic blacklists
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Using the domain name system for system break-ins
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
IT 2008: the history of a new computing discipline
Communications of the ACM
An investigation of unauthorised use of wireless networks in adelaide, south australia
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Detecting traffic snooping in tor using decoys
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.02 |