Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 7438 results
Sort by: relevance publication year

International Board of Referees

JOURNAL ARTICLE published July 2001 in Computers & Security

MOD tooled up on security issue

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Contracting a macro virus whilst surfing the internet

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: David Aubrey-Jones

Calendar of forthcoming conferences and events

JOURNAL ARTICLE published December 2003 in Computers & Security

Case history of a virus attack

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: Harold Joseph Highland

Random bits & bytes

JOURNAL ARTICLE published November 1991 in Computers & Security

Authors: HaroldJoseph Highland

Reviewer Acknowledgement list_2017

JOURNAL ARTICLE published January 2018 in Computers & Security

Apollo skirts site license issue

JOURNAL ARTICLE published April 1988 in Computers & Security

Calendar

JOURNAL ARTICLE published August 1984 in Computers & Security

Filtering XPath expressions for XML access control

JOURNAL ARTICLE published October 2004 in Computers & Security

Authors: Jae-Myeong Jeon | Yon Dohn Chung | Myoung Ho Kim | Yoon Joon Lee

Authentication services in distributed systems

JOURNAL ARTICLE published December 1993 in Computers & Security

Authors: Dieter Gollmann | Thomas Beth | Frank Damm

Establishing a network security programme

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Gerald L. Kovacich

International board of referees

JOURNAL ARTICLE published January 1996 in Computers & Security

In this issue …

JOURNAL ARTICLE published September 1986 in Computers & Security

Authors: HaroldJoseph Highland

Modeling network security

JOURNAL ARTICLE published May 2006 in Computers & Security

Authors: Danny Bradbury

“Hackers”: Know the adversary

JOURNAL ARTICLE published August 1991 in Computers & Security

Authors: Belden Menkus

IT security is a business issue not a technical one

JOURNAL ARTICLE published January 1996 in Computers & Security

Spatial counts under differential privacy mechanism on changing spatial scales

JOURNAL ARTICLE published August 2018 in Computers & Security

Research funded by National Institutes of Health (1R01HG006844,CNS-1111529,CNS-1228198,IIS-1633331,CICI-1547324,W911NF-17-1-0356) | National Science Foundation (1R01HG006844,CNS-1111529,CNS-1228198,IIS-1633331,CICI-1547324,W911NF-17-1-0356) | Army Research Office (1R01HG006844,CNS-1111529,CNS-1228198,IIS-1633331,CICI-1547324,W911NF-17-1-0356)

Authors: Jun Jiang | Bowei Xi | Murat Kantarcioglu

In this issue…

JOURNAL ARTICLE published June 1986 in Computers & Security

Authors: HaroldJoseph Highland

Security views - Malware update

JOURNAL ARTICLE published May 2005 in Computers & Security