The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Inf. Manag. Comput. Security"( http://dblp.L3S.de/Venues/Inf._Manag._Comput._Security )

URL (DBLP): http://dblp.uni-trier.de/db/journals/imcs

Publication years (Num. hits)
1993 (27) 1994 (29) 1995 (31) 1996 (37) 1997 (29) 1998 (27) 1999 (27) 2000 (26) 2001 (27) 2002 (29) 2003 (30) 2004 (29) 2005 (31) 2006 (31) 2007 (29) 2008 (28) 2009 (24) 2010 (22) 2011 (20) 2012 (22) 2013 (25) 2014 (30)
Publication types (Num. hits)
article(610)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 610 publication records. Showing 610 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Rayne Reid, Johan Van Niekerk Brain-compatible, web-based information security education: a statistical study. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peter James, Don Griffiths A secure portable execution environment to support teleworking. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Firman Azhari Quick detection of NFC vulnerability: Implementation weakness exploitation. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1John Haggerty, Sheryllynne Haggerty, Mark John Taylor Forensic triage of email network narratives through visualisation. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Waldo Rocha Flores, Hannes Holm, Gustav Svensson, Göran Ericsson Using phishing experiments and scenario-based surveys to understand security behaviours in practice. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mario Silic, Andrea Back Information security: Critical review and future directions for research. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weizhi Meng, Duncan S. Wong, Lam-for Kwok The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Issa Atoum, Ahmed Otoom, Amer Abu-Ali A holistic cyber security implementation framework. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rayne Reid, Johan Van Niekerk Snakes and ladders for digital natives: information security education for the youth. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Deepa Mani, Kim-Kwang Raymond Choo, Sameera Mubarak Information security in the South Australian real estate industry: A study of 40 real estate organisations. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eugene Kaspersky, Steven Furnell A security education Q&A. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sanjay Bahl, O. P. Wali Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, Johan E. Bengtsson Variables influencing information security policy compliance: A systematic review of quantitative studies. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Iwan Gulenko Improving passwords: influence of emotions on security behaviour. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer Developing and testing SCoP - a visual hash scheme. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram A study of information security awareness in Australian government organisations. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sindhuja P. N. Impact of information security initiatives on supply chain performance: An empirical investigation. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thembekile O. Mayayise, Isaac Olusegun Osunmakinde E-commerce assurance models and trustworthiness issues: an empirical study. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jae Choi, Derek L. Nazareth Repairing trust in an e-commerce and security context: an agent-based modeling approach. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eyong B. Kim Recommendations for information security awareness training for college students. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kirsi Helkala, Tone Hoddø Bakås Extended results of Norwegian password security survey. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat, Mamoun Alazab Using response action with intelligent intrusion detection and prevention system against web application malware. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein Current challenges in information security risk management. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos, Carlos Becker Westphall A cyclical evaluation model of information security maturity. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Swapan Purkait, Sadhan Kumar De, Damodar Suar An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Winfred Yaokumah Information security governance implementation within Ghanaian industry sectors: An empirical study. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1John D'Arcy, Gwen Greene Security culture and the employment relationship as drivers of employees' security compliance. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Atif Ahmad, Sean B. Maynard Teaching information security management: reflections and experiences. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dusan Repel, Ingo Stengel Grammar-based transformations: attack and defence. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mark A. Harris, Karen P. Patten Mobile device security considerations for small- and medium-sized enterprise business mobility. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dimitrios Michalopoulos, Ioannis Mavridis A method to calculate social networking hazard probability in definite time. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joshua Arvin S. Lat, Rod Xavier R. Bondoc, Kevin Charles V. Atienza SOUL System: secure online USB login system. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Iwan Gulenko Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan Unified trust establishment by leveraging remote attestation - modeling and analysis. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter Psychosocial risks: Can their effects on the security of information systems really be ignored? Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ayako Komatsu, Daisuke Takagi, Toshihiko Takemura Human aspects of information security: An empirical study of intentional versus actual behavior. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mariah Strella P. Indrinal, Ranyel Bryan L. Maliwanag, Marynyriene I. Silvestre VoxGrid: a mobile voice verification system. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pablo Carballude González Fingerprinting Tor. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kallaya Jairak, Prasong Praneetpolgrang Applying IT governance balanced scorecard and importance-performance analysis for providing IT governance strategy in university. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexandros Papanikolaou, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Konstantinos Papapanagiotou, Anastasios Stasinopoulos A framework for teaching network security in academic environments. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mark Ciampa A comparison of password feedback mechanisms and their impact on password entropy. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Karin Hedström, Fredrik Karlsson, Ella Kolkowska Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hussein Shaaban, Marc Conrad Democracy, culture and information security: a case study in Zanzibar. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mahmood Hajli A research framework for social commerce adoption. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ang Cui, Jatin Kataria, Salvatore J. Stolfo Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wu He A survey of security risks of mobile social media through blog mining and an extensive literature search. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Levi, Matthew Leighton Williams Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cristian Thiago Moecke, Melanie Volkamer Usable secure email communications: criteria and evaluation of existing approaches. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vinod Pathari, Rajendra M. Sonar Deriving an information security assurance indicator at the organizational level. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh Resolving vulnerability identification errors using security requirements on business process models. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kai S. Koong, Mohammad I. Merhi, Jun Sun Push and pull effects of homeland information security incentives. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Costas Lambrinoudakis Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hannes Holm, Mathias Ekstedt Estimates on the effectiveness of web application firewalls against targeted attacks. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tarek S. Sobh Anomaly detection based on hybrid artificial immune principles. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Teodor Sommestad, Amund Hunstad Intrusion detection and the role of the system administrator. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kerry-Lynn Thomson, Johan Van Niekerk Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Geordie Stewart, David Lacey Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zac Sadan, David G. Schwartz Social Network Analysis for Cluster-Based IP Spam Reputation. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Teodor Sommestad, Hannes Holm, Mathias Ekstedt Estimates of success rates of remote arbitrary code execution attacks. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrew Stewart Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Raydel Montesino, Stefan Fenz, Walter Baluja SIEM-based framework for security controls automation. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Julio Angulo, Simone Fischer-Hübner, Erik Wästlund, Tobias Pulls Towards Usable Privacy Policy Display & Management for PrimeLife. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vandana Pramod, Jinghua Li, Ping Gao 0003 A framework for preventing money laundering in banks. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Swapan Purkait Phishing counter measures and their effectiveness - literature review. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jonna Järveläinen Information security and business continuity management in interorganizational IT relationships. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Workman Validation of a Biases Model in Strategic Security Decision-Making. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eric H. Goldman The effect of acquisition decision making on security posture. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi, Shengyong Chen Reliable and secure encryption key generation from fingerprints. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vasilios Katos An integrated model for online transactions: illuminating the black box. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stig Ole Johnsen Resilience at Interfaces - Improvement of Safety and Security in Distributed Control Systems by Web of Influence. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Norshidah Mohamed, Jasber Kaur A. P. Gian Singh A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mayur S. Desai, Kiran J. Desai, Lonnie D. Phelps E-commerce policies and customer privacy: a longitudinal study (2000-2010). Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Margaret Tan, Kathrine Sagala Aguilar An investigation of students' perception of Bluetooth security. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vinod Pathari, Rajendra M. Sonar Identifying linkages between statements in information security policy, procedures and controls. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cornelius Johannes Kruger, Mavis Noxolo Mama Incorporating business strategy formulation with identity management strategy formulation. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Malcolm Robert Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius Why Do Some People Manage Phishing Emails Better Than Others? Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ahmed Patel, Wei Qi, Mona Taghavi An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Norazah Mohd Suki, Thurasamy Ramayah, Norbayah Mohd Suki Understanding Consumer Intention with Respect to Purchase and Use of Pirated Software. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dimitris Mitropoulos, Vassilios Karakoidas, Panos Louridas, Diomidis Spinellis Countering Code Injection Attacks: A Unified Approach. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Craig E. Wills, Mihajlo Zeljkovic A Personalized Approach to Web Privacy - Awareness, Attitudes and Actions. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abhishek Vaish, Aditya Prabhakar, Himanshu Mishra, Nupur Dayal, Shishir Kumar Singh, Utkarsh Goel, Natalie Coull Quantifying Information Dynamics Through New Valuation System. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dov Shirtz, Yuval Elovici Optimizing Investment Decisions in Selecting Information Security Remedies. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hannes Holm, Teodor Sommestad, Jonas Almroth, Mats Persson A quantitative evaluation of vulnerability scanning. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Teodor Sommestad, Mathias Ekstedt, Hannes Holm, Muhammad Afzal Security mistakes in information system deployment projects. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chlotia Posey Garrison, Matoteng Ncube A Longitudinal Analysis of Data Breaches. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström The 14 Layered Framework for Including Social and Organisational Aspects in Security Management. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dan Harnesk, John Lindström Shaping Security Behavior through Discipline and Agility: Implications for Information Security Management. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Helen Georgia Kapodistria, Sarandis Mitropoulos, Christos Douligeris An Advanced Web Attack Detection and Prevention Tool. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Debasis Bhattacharya Leadership Styles and Information Security in Small Businesses. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lior Lazar, Omer Tikolsky, Chanan Glezer, Moshe Zviran Personalized Cognitive Passwords: An Exploratory Assessment. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vasileios Vlachos, Marilena Minou, Vassilis Assimakopoulos, Androniki Toska The Landscape of Cybercrime in Greece. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1George Aggelinos, Sokratis K. Katsikas Enhancing SSADM with Disaster Recovery Plan activities. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ladislav Beranek Risk Analysis Methodology Used by Several Small and Medium Enterprises in the Czech Republic. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haider Abbas, Christer Magnusson, Louise Yngström, Ahmed Hemani Addressing Dynamic Issues in Information Security Management. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Janne Merete Hagen, Eirik Albrechtsen, Stig Ole Johnsen The long term effects of information security e-learning on organizational learning. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmed Patel, Wei Qi, Mona Taghavi Design of Secure and Trustworthy Mobile Agent-based E-marketplace System. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jacqueline H. Hall, Shahram Sarkani, Thomas A. Mazzuchi Impacts of Organizational Capabilities In Information Security. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wendy Hui Brand, knowledge, and false sense of security. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov Preparation, detection, and analysis: the diagnostic work of IT security incident response. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lynn Futcher, Cheryl Schroder, Rossouw von Solms Information Security Education in South Africa. Search on Bibsonomy Inf. Manag. Comput. Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 610 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license