Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 7436 results
Sort by: relevance publication year

Data encryption standard. 1975–January 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities Database)

JOURNAL ARTICLE published October 1988 in Computers & Security

The virtuous virus

JOURNAL ARTICLE published December 1992 in Computers & Security

Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland

New member of the International Board of Editors

JOURNAL ARTICLE published March 1985 in Computers & Security

Mining meaningful and rare roles from web application usage patterns

JOURNAL ARTICLE published May 2019 in Computers & Security

Authors: Nurit Gal-Oz | Yaron Gonen | Ehud Gudes

Mining TCP/IP packets to detect stepping-stone intrusion

JOURNAL ARTICLE published December 2007 in Computers & Security

Authors: Jianhua Yang | Shou-Hsuan Stephen Huang

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

JOURNAL ARTICLE published May 2014 in Computers & Security

Authors: Nikos Virvilis | Dimitris Gritzalis

Achieving Interoperability in a Multiple-Security- Policies Environment

JOURNAL ARTICLE published March 2000 in Computers & Security

Authors: S.A. Kokolakis | E.A. Kiountouzis

Data interchange and legal security — signature surrogates

JOURNAL ARTICLE published January 1994 in Computers & Security

Authors: Karl Rihaczek

Tempest over leaking computers

JOURNAL ARTICLE published December 1987 in Computers & Security

Authors: HaroldJoseph Highland

Editorial Board

JOURNAL ARTICLE published August 2022 in Computers & Security

Individual Authentication in Multiparty Communications

JOURNAL ARTICLE published November 2002 in Computers & Security

Authors: F Bergadano | D Cavagnino | B Crispo

Microcomputer audit trails made easy

JOURNAL ARTICLE published September 1986 in Computers & Security

Report says US has backdoor to notes

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Automated audit — Tools & techniques

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Norman Crocker

Special abstract: Study of computer “viruses” and their potential for infecting Commonwealth computer systems

JOURNAL ARTICLE published February 1989 in Computers & Security

European unification '92 impacts on information security

JOURNAL ARTICLE published November 1991 in Computers & Security

Authors: Sanford Sherizen

Network managers unite over bug

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Helen Meyer

Incalculable potential for damage by cyber-terrorism

JOURNAL ARTICLE published October 2001 in Computers & Security

Authors: Stephen Hinde

Unlocking virtual private networks

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer