Inside risks: insecurity about security?
Communications of the ACM
Using the new ACM code of ethics in decision making
Communications of the ACM
CERT incident response and the Internet
Communications of the ACM
Computer ethics: a model of the influences on the individual's ethical decision making
ACM SIGCPR Computer Personnel
Combating computer crimes: a long term strategy
ECA '94 Proceedings of the conference on Ethics in the computer age
Computer ethics and social issues case analysis: an environmental algorithm
ACM SIGCSE Bulletin
Panoptis: intrusion detection using a domain-specific language
Journal of Computer Security
A Software Protection System for Internet Commerce
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Encyclopedia of Computer Science
Encyclopedia of Computer Science
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Computer viruses as artificial life
Artificial Life
Core technology analysis and development for the virus and hacking prevention
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Detection methods for executive compressed malicious codes in wire/wireless networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Distributed computing: an experimental investigation of a malicious denial-of-service applet
Computer Communications
Hi-index | 0.05 |