The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AISM"( http://dblp.L3S.de/Venues/AISM )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aism

Publication years (Num. hits)
2004 (20) 2005 (19)
Publication types (Num. hits)
inproceedings(37) proceedings(2)
Venues (Conferences, Journals, ...)
AISM(39)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 39 publication records. Showing 39 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Patricia A. H. Williams Physician secure thyself. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Patricia A. H. Williams The underestimation of threats to patient data in clinical practice. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Craig Valli, Andrew Woodward (eds.) Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005 Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Leanne Ngo, Wanlei Zhou 0001, Matthew J. Warren Understanding Transition towards Information Security Culture Change. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Reijo Savola Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Lih Wern Wong Potential Bluetooth Vulnerabilities in Smartphones. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac Smart Card Authentication for Mobile Devices. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Andrew Woodward Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Martin Dart Seeking information superiority: strategies for business in the commercial application of information operations. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Zhiqi Tao, Anthonie B. Ruighaver Detecting Rogue Access Points that endanger the Maginot Line of Wireless Authentication. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Mahdi Seify Risk Management in CRM Security Management. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Rosanna Fanciulli An investigation into the paradox of organisational flexibility versus security: A research project overview. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Lennon Hopkins Identity Synthesis: Creating An Identity From Scratch. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Marwan Al-Zarouni Taxonomy of WRT54G(S) Hardware and Custom Firmware. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Aaron Olding, Paul Turner My Problem or Our Problem? - Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of 'Malicious Targeted Attacks'. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Yi-Chi Lin, Jill Slay Non-Repudiation in Pure Mobile Ad Hoc Network. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1Graeme Pye, Matthew J. Warren Benchmarking E-business Security: A Model and Framework. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1William Hutchinson Information Security: a Misnomer. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad Security Governance: Its Impact on Security Culture. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
1 Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004 Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Jill Slay, Gerald Quirchmayr A Formal Model for the Relationship between Culture and Trust within is Security Management. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Emiko Terado, Patricia A. H. Williams Securing PDAs in the Healthcare Environment. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1C. C. Terence Tan Developing a framework for understanding Security Governance. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Christopher Bolan Need to Know: Security or Liability? Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Malcolm R. Pattinson Risk Homeostasis as a Factor of Information Security. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Omar Zakaria Understanding Challenges of Information Security Culture: A Methodological Issue. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells Graphical Authentication: Justifications and Objectives. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Sabbir Ahmed, Leisa Armstrong Securing Web Services with XML aware Digital Signatures. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Girish Bhagwan Gokhale, David A. Banks Organisational Information Security: A Viable System Perspective. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Peter Wolski SOHO Wireless Intrusion Detection Systems - Cure or Placebo. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Gim Hiong Soh, Timo Vuori New Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Warren Brooks, Matthew J. Warren Health Information Security Evaluation: Continued Development of an Object-Oriented Method. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Mathew Hannan, Basil Tucker Risk Management and Organisational Culture: The Implications of Computer Network Attacks and Malware Incidents on Organizational Risk Management. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Michael Wynne, Peter James Securing Data at Rest. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1A. Jancic, Matthew J. Warren PKI - Advantages and Obstacles. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Paul Ashley Enforcement of a P3P Privacy Policy. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Christopher Bolan, Daniel Mende Computer Security Research: Approaches and Assumptions. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1G. Murphy An Examination of the Security of Routing Protocol Updates. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
1Vassilis Dimopoulos, Steven Furnell, Murray E. Jennex, Ioannis Kritharas Approaches to IT Security in Small and Medium Enterprises. Search on Bibsonomy AISM The full citation details ... 2004 DBLP  BibTeX  RDF
Displaying result #1 - #39 of 39 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license