The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase computer security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1980 (15) 1981-1983 (20) 1984-1985 (23) 1986-1987 (16) 1988 (25) 1989 (85) 1990 (98) 1991 (82) 1992 (94) 1993 (108) 1994 (88) 1995 (42) 1996 (105) 1997 (91) 1998 (101) 1999 (85) 2000 (114) 2001 (110) 2002 (127) 2003 (144) 2004 (187) 2005 (286) 2006 (292) 2007 (271) 2008 (261) 2009 (210) 2010 (224) 2011 (189) 2012 (182) 2013 (168) 2014 (208) 2015 (216) 2016 (202) 2017 (212) 2018 (222) 2019 (18)
Publication types (Num. hits)
article(900) book(17) incollection(80) inproceedings(3801) phdthesis(7) proceedings(116)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2896 occurrences of 1292 keywords

Results
Found 4921 publication records. Showing 4921 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
126Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto Editorial. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43Max M. North, Roy George, Sarah M. North Computer security and ethics awareness in university environments: a challenge for management of information systems. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer ethics awareness, computer security awareness, management information systems
41Lee Ohringer An Assumption About Computer Security (it ain't necessarily so - Abstract). Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
39Felicia R. Doswell A case study on computer security for non-expert computer user. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, computer security
39Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean A Security Model for Military Message Systems: Retrospective. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Storage channels, Security, Verification, confinement, message systems
37F. C. Smith Ethical Responsibilities and Legal Liabilities of Network Security Professionals. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ethical responsibilities, legal liabilities, network security professionals, tort litigation, unregulated economic environment, public law enforcement, criminal abuses, technical solutions, civil wrongs, individual liberty, group liberty, criminal law, civil law, computer literate lawyers, computer security failures, millennium bug, legal liability, social redress, computer networks, computer networking, morality, network vulnerabilities, Year 2000 problem
36Shiva Azadegan, M. Lavine, Michael O'Leary, Alexander L. Wijesinha, Marius Zimand An undergraduate track in computer security. Search on Bibsonomy ITiCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF application software security, computer security case studies, undergraduate computer security education, security, cryptography, network, operating systems security
34Wenliang Du, Ronghua Wang SEED: A Suite of Instructional Laboratories for Computer Security Education. Search on Bibsonomy ACM Journal of Educational Resources in Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF instructional laboratories, security, education
34Stefan A. Robila, Carl Bredlau Writing requirements in computer security. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF communication, pedagogy, computer security, writing
34Ross J. Anderson Liability and Computer Security: Nine Principles. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
34Yvo Desmedt Breaking the Traditional Computer Security Barriers. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
33Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner Policy-Driven Memory Protection for Reconfigurable Hardware. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedded Systems, Computer Security, Security Policies, Policy Languages, Reference Monitors, Separation Kernels
33Paul J. Wagner, Andrew T. Phillips A portable computer security workshop. Search on Bibsonomy ACM Journal of Educational Resources in Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF laboratory exercises, portable workshop, Computer security
33Jongwoo Chae, Jungkyu Kwon, Mokdong Chung Computer Security Management Model Using MAUT and SNMP. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MAUT (Multi-Attribute Utility Theory), Simple Heuristics, mobile agent, SNMP, security management, adaptive security
33Giampaolo Bella, Ronaldo Menezes, James A. Whittaker Editorial Message: special track on computer security. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Xiaoyuan Suo, Ying Zhu, G. Scott Owen A Task Centered Framework for Computer Security Data Visualization. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF visualization, computer security, task
32Andrei Sabelfeld, Andrew C. Myers A Model for Delimited Information Release. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems
31Shiva Azadegan, Vanessa McKenna Use of Honeynets in Computer Security Education. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computer Security, Honeypots, Honeynets, Security Education
30Stephen F. Burnett Computer Security Training and Education: A Needs Analysis. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1996 DBLP  DOI  BibTeX  RDF computer security training, computer security education, employer's perspective, security practitioners, training, computer science education, security of data, industry, employment, needs analysis
30Laurie Werner Redefining computer literacy in the age of ubiquitous computing. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF home computer security, laboratory activities, pedagogy
30Steven J. Greenwald E-Prime for security: a new security paradigm. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clark-Wilson, E-Prime, Sapir-Whorf hypothesis, disaster planning, enterprise security policy, general semantics, incident handling, informal security policy modeling, organizational security policy, principle of linguistic relativity, security life cycle, software life cycle SP800-12, user awareness, user centered security, user support and operations, modeling, formal methods, planning, RBAC, role-based access control, risk management, information assurance, security engineering, life cycle, spam detection, user training, security policy modeling, program management
30Brian Hay, Ronald Dodge, Kara L. Nance Using Virtualization to Create and Deploy Computer Security Lab Exercises. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Paul Mullins, Jim Wolfe, Michael Fry, Erik L. Wynters, William C. Calhoun, Robert Montante, William Oblitey Panel on integrating security concepts into existing computer courses. Search on Bibsonomy SIGCSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Jochen Liedtke A Short Note on Small Virtually-Addresses Control Blocks. Search on Bibsonomy Operating Systems Review The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
29Amanda M. Holland-Minkley Cyberattacks: a lab-based introduction to computer security. Search on Bibsonomy SIGITE Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF laboratory coursework, computer security, IT education
29Janine DeWitt, Cynthia Della Torre Cicalese Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical reasoning, integrative learning, education, case studies, active learning, curriculum, computer security, ethics, information assurance, social context, situated learning, cognitive apprenticeship, authentic learning
29Mike Andrews, James A. Whittaker Computer Security. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2004 DBLP  DOI  BibTeX  RDF defense in depth, computer security, attackers, firewalls, vulnerability
28Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow attack
28S. Glaseman, R. Turn, R. S. Gaines Problem areas in computer security assessment. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
28Blair Taylor, Shiva Azadegan Moving beyond security tracks: integrating security in cs0 and cs1. Search on Bibsonomy SIGCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information security curriculum development, computer science curriculum, security education
28Christoph Lingenfelder, Sven Lorenz Knowledge-based security administration in a distributed environment. Search on Bibsonomy CASCON The full citation details ... 1993 DBLP  BibTeX  RDF
27Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen High-Assurance Synthesis of Security Services from Basic Microservices. Search on Bibsonomy ISSRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Microservices, Software architecture, Software composition, Security service
27Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer Evaluating the Security of Three Java-Based Mobile Agent Systems. Search on Bibsonomy Mobile Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF computer security, security testing, Mobile agent systems
26Indrajit Ray System Security Track Chair's Message. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26David Carlson Teaching computer security. Search on Bibsonomy SIGCSE Bulletin The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer security labs, security, network security, computer security, information technology security
26John R. Goodall Introduction to Visualization for Computer Security. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Louise Giovane Becker A national perspective on computer security. Search on Bibsonomy ACM Annual Conference The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
25Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena BitBlaze: A New Approach to Computer Security via Binary Analysis. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis
25Cathie LeBlanc, Evelyn Stiller Teaching computer security at a small college. Search on Bibsonomy SIGCSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF education, information security
25I-Ling Yen Computer security: the good, the bad and the ugly. Search on Bibsonomy HASE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Trusted Computer Systems Evaluation Criteria, computer security, firewall, cost, security of data, data security, high assurance systems
25Helen L. James Managing information systems security: a soft approach. Search on Bibsonomy ISCNZ The full citation details ... 1996 DBLP  DOI  BibTeX  RDF information systems security management, soft approach, computer security problems, Orion Strategy, participative approach, security planning, Australian organisation, information systems, user participation
25Carl E. Landwehr Computer security. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Pietro Iglio TrustedBox: A Kernel-Level Integrity Checker. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF integrity checker
25Sonia Chiasson, Paul C. van Oorschot, Robert Biddle Graphical Password Authentication Using Cued Click Points. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, User Study, Computer Security, Usable Security, Graphical Passwords
25Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer Compile-Time Detection of Information Flow in Sequential Programs. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF formal verification, program analysis, computer security, information flow, verification tools
25Christel Calas GDoM: a Multilevel Document Manager. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF multilevel security (mls), mls application, mls document manager, mls Unix kernel, computer security
24J. D. Tygar When Computer Security Crashes into Multimedia. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Stefan Axelsson Visualisation for Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Timothy Rosenberg, Lance J. Hoffman Taking the network on the road: Portable network solutions for computer security educators. Search on Bibsonomy ACM Journal of Educational Resources in Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security, computer security, cooperative learning, instructional design, information assurance, Closed laboratories
23Joel Brynielsson An information assurance curriculum for commanding officers using hands-on experiments. Search on Bibsonomy SIGCSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hands-on experiments, high rank officer training, information operations, isolated computer lab, computer security
23Cristina Cifuentes, Trent Waddington, Mike Van Emmerik Computer Security Analysis through Decompilation and High-Level Debugging. Search on Bibsonomy WCRE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security, reverse engineering, debugging, Decompilation
23Walid Rjaibi An introduction to multilevel secure relational database management systems. Search on Bibsonomy CASCON The full citation details ... 2004 DBLP  BibTeX  RDF
23Vijay Varadharajan Network Security Policy Models. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
22Attila Ondi, Ronaldo Menezes, Richard Ford Network Distribution of Security Policies via Ant-like Foraging Behavior. Search on Bibsonomy ICIW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Joshua B. Gross, Mary Beth Rosson Looking for trouble: understanding end-user security management. Search on Bibsonomy CHIMIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Keesook J. Han, Ahmed H. Tewfik Scalable cryptographic scheme for networked multimedia applications. Search on Bibsonomy ICIP (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Xiaoyuan Suo, Ying Zhu, G. Scott Owen Measuring the Complexity of Computer Security Visualization Designs. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira Modular Access Control Via Strategic Rewriting. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Danilo Bruschi, Emilia Rosti, R. Banfi A Tool for Pro-active Defense Against the Buffer Overrun Attack. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Mohamed Dâfir Ech-Cherif El Kettani, Taieb Debbagh NCSec: a national cyber security referential for the development of a code of practice in national cyber security management. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ISO27002, cyber criminality, referential, organizational structure, cyber security
22David Alan Hanson Data security. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1979 DBLP  DOI  BibTeX  RDF
21Shalom N. Rosenfeld, Ioana Rus, Michel Cukier Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. Search on Bibsonomy COMPSAC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Robert Ball, Glenn A. Fink, Chris North Home-centric visualization of network traffic for security administration. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, information visualization, networks
21Stephen A. Weis Security Parallels between People and Pervasive Devices. Search on Bibsonomy PerCom Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Azzedine Benameur, Serge Fenet, Ayda Saïdane, Smriti Kumar Sinha A Pattern-Based General Security Framework: An eBusiness Case Study. Search on Bibsonomy HPCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Matthias Werner 0001, Michael A. Jaeger, Helge Parzyjegla An Application of the (max, +) Algebra to Information Flow Security. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF maxplus, security, information flow, lattice model
21Peter P. Swire Security market: incentives for disclosure of vulnerabilities. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld Bridging Language-Based and Process Calculi Security. Search on Bibsonomy FoSSaCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20John M. D. Hill, Curtis A. Carver Jr., Jeffrey W. Humphries, Udo W. Pooch Using an isolated network laboratory to teach advanced networks and security. Search on Bibsonomy SIGCSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Norman R. Nielsen Computers, security, and the audit function. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
20Bradley S. Rubin, Donald Cheung Computer Security Education and Research: Handle with Care. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Deborah A. Frincke, S. Oudekirk, B. Popovsky Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. Search on Bibsonomy ACM Journal of Educational Resources in Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, protection, Computer forensics
19Matt Bishop Teaching Computer Security. Search on Bibsonomy SEC The full citation details ... 1993 DBLP  BibTeX  RDF
19James P. Anderson Computer security myths mythtakes or 'The real security problem is...'. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Deborah A. Frincke, Matt Bishop Guarding the Castle Keep: Teaching with the Fortress Metaphor. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer security field, fortress, pedagogical took, student understanding, metaphor
19Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov On the Concept of Software Obfuscation in Computer Security. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Program obfuscation, security, encryption, Turing machine
19Pin Ren Ensuring the continuing success of vizsec. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF visualization design, dissemination, security visualization, visualization evaluation
19Ronaldo Menezes Self-organization and computer security: a case study in adaptive coordination. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, coordination, self-organization
19Stephen Lau, Scott Campbell, William T. Kramer, Brian Tierney S06 - Computing protection in open HPC environments. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Mark W. Bailey, Clark L. Coleman, Jack W. Davidson Defense against the dark arts. Search on Bibsonomy SIGCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-virus software, compilers, computer science education, computer viruses
18Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation. Search on Bibsonomy J. Cryptology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Interative protocols, Interative protocols, Cryptography, Cryptography, Computer security, Computer security, Key words
18Wenliang Du, Zhouxuan Teng, Ronghua Wang SEED: a suite of instructional laboratories for computer SEcurity EDucation. Search on Bibsonomy SIGCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF instructional operating system, security, laboratory
18Lee Ohringer Computer security in the federal government: Where we are, how we got here, where we are going. Search on Bibsonomy ACM Annual Conference (2) The full citation details ... 1978 DBLP  DOI  BibTeX  RDF
18Roberto Tamassia, Bernardo Palazzi, Charalampos Papamanthou Graph Drawing for Security Visualization. Search on Bibsonomy Graph Drawing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Bager Zarei, Mehdi Asadi, Saeed Nourizadeh, Shapour Jodi Begdillo A Novel Security Schema for Distributed File Systems. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DFS1, DES2, Security, Fault Tolerance, Load Balancing, Fault Recovery
18Scott Harrison, Nadine Hanebutte, Jim Alves-Foss Programming Education in the Era of the Internet: A Paradigm Shift. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18James Walden A real-time information warfare exercise on a virtual network. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF capture the flag, network security, virtual machine, computer security, laboratory, exercise, user-mode linux, information warfare
18Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji The Evolution of System-Call Monitoring. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Mark Burgess, Geoffrey Canright, Kenth Engø-Monsen A graph-theoretical model of computer security. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Social networks, Access control, Social engineering, Forensic analysis
18Xavier Leroy Computer Security from a Programming Language and Static Analysis Perspective. Search on Bibsonomy ESOP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Peter S. Browne Computer security: a survey. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
18Gabriele Meiselwitz Information security across disciplines. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ias education, information science curriculum, computer science curriculum
18Blair Taylor, Shiva Azadegan Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security curriculum development, risk management, computer science curriculum, security education
18Li Gong Developing Security Systems in the Real World. Search on Bibsonomy ECOOP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Performance Evaluation Review The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Matt Bishop Teaching context in information security. Search on Bibsonomy ACM Journal of Educational Resources in Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer security, Environment, instruction, judgment
17Kwong H. Yung Detecting Long Connection Chains of Interactive Terminal Sessions. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF connection chain, terminal session, delayed acknowledgment, reply echo, echo delay, intrusion detection, network security, computer security, network protocol, Stepping stone
17David M. Chess Security in autonomic computing. Search on Bibsonomy SIGARCH Computer Architecture News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Lujo Bauer, Limin Jia, Divya Sharma Constraining Credential Usage in Logic-Based Access Control. Search on Bibsonomy CSF The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Access control, Logic, Computer security, Formal languages
17Mayuresh Ektare, Yanxia Yang The Balancing Act Between Computer Security and Convenience. Search on Bibsonomy HCI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF convenience, user experience, Computer security, user behavior, Spyware, Viruses
Displaying result #1 - #100 of 4921 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license