The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISSA"( http://dblp.L3S.de/Venues/ISSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/issa

Publication years (Num. hits)
2002 (28) 2003-2004 (36) 2005 (35) 2006 (34) 2008 (25) 2009 (34) 2010 (33) 2011 (40) 2012 (28) 2013 (32) 2014 (33) 2015 (34) 2016 (19) 2017 (15) 2019-2020 (13)
Publication types (Num. hits)
inproceedings(424) proceedings(15)
Venues (Conferences, Journals, ...)
ISSA(439)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 439 publication records. Showing 439 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dario Forte The "Art" Of Log Correlation - Tools And Techniques For Correlating Events And Log Files. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Ulrich Ultes-Nitsche Run-Time Protocol Conformance Verification In Firewalls. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Mariette Jones Legality Of Monitoring E-Mail At The Workplace: A Legal Update. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Arvish Ramdeyal A General Methodology For The Development Of An Effective Information Security Policy. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Evangelos D. Frangopoulos Biometric Protection Of Smartcards Through Fingerprint Matching: A Technological Overview And Possible Directions. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Manfred P. Hertenberger A Case For Information Ownership In Erp Systems. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Johannes J. van Eeden Security Considerations In A Global Message Service Handler Design. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1W. G. Bornman A Framework For Aligning Information Security Risk Management Methods With It Governance Recommendations. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Telanie Grogler Assessing The Policy Dimension Of Information Security. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Stephen Perelson An Investigation Into Access Control For Mobile Devices. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1 Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa Search on Bibsonomy ISSA The full citation details ... 2003 DBLP  BibTeX  RDF
1Lance A. K. Ingram Towards a pattern-based approach for achieving semantic integrity in object-relational databases. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Cheryl Vroom Auditing the Employee in the Work Environment with Regard to Information Security. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Adéle Martins Assessing Information Security Culture. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Simon R. Chudley, Ulrich Ultes-Nitsche Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1John Rollason, Tom Addison, Kim Munro IS Security: User Identification and Authentication - The First Pillar of IS Security. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Karin Venter The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Simon Taylor Practical Unix Security - Securing IBM's AIX. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Lizette Robbertze Information Security Implementation Methodologies. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Kerry-Lynn Thomson Corporate Governance: Information security the weakest link? Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Wesley Brandi On the Semantic Web and its Web of Trust. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Johan Van Niekerk A Web-Based Portal For Information Security Education. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Evan James Dembskey Quantum Cryptography - Advances in computer science may radically alter cryptography. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Paula Kotzé Feedback And Task Analysis For E-Commerce Sites. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Francois Searle An Analysis of Anonymity on the Internet. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Kim Munro Steganography - is it becoming a double-edged sword in computer security? Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Lindie du Plessis Information Security Awareness: Baseline Education and Certification. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Marianne Loock Minimizing Security Risk Areas revealed by Data mining. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Karin Höne Information Security Policy - What do International Information Security Standards say? Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Petrunel Gerber Information Security Health Check. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Peter Jonathan de Villiers Towards a Content-based Billing Model: The Synergy between Access Control and Billing. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Marijke Coetzee Secure Database Connectivity On The WWW. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Willem Engelbrecht Access control and separation of duty in agent-based workflow environments. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Jacques Botha A cyclic approach to Business Continuity Planning. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Hein S. Venter Comparing Intrusion Detection Tools using Generic Vulnerability Categories. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Thomas Holz 0002 An Efficient Intrusion Detection System Design. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Albin Zuccato A modified mean value approach to assess security risk. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Oliver Andre Hoppe Security architecture of the Microsoft .NET framework. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
1Ulrich Ultes-Nitsche, InSeon Yoo An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
Displaying result #401 - #439 of 439 (100 per page; Change: )
Pages: [<<][1][2][3][4][5]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license