Facet browsing currently unavailable
Page 5 of 7436 results
Sort by: relevance publication year
Data encryption standard. 1975–January 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities Database) JOURNAL ARTICLE published October 1988 in Computers & Security |
The virtuous virus JOURNAL ARTICLE published December 1992 in Computers & Security |
Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System JOURNAL ARTICLE published January 1995 in Computers & Security |
New member of the International Board of Editors JOURNAL ARTICLE published March 1985 in Computers & Security |
Mining meaningful and rare roles from web application usage patterns JOURNAL ARTICLE published May 2019 in Computers & Security |
Mining TCP/IP packets to detect stepping-stone intrusion JOURNAL ARTICLE published December 2007 in Computers & Security |
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks JOURNAL ARTICLE published May 2014 in Computers & Security |
Achieving Interoperability in a Multiple-Security- Policies Environment JOURNAL ARTICLE published March 2000 in Computers & Security |
Data interchange and legal security — signature surrogates JOURNAL ARTICLE published January 1994 in Computers & Security |
Tempest over leaking computers JOURNAL ARTICLE published December 1987 in Computers & Security |
Editorial Board JOURNAL ARTICLE published August 2022 in Computers & Security |
Individual Authentication in Multiparty Communications JOURNAL ARTICLE published November 2002 in Computers & Security |
Microcomputer audit trails made easy JOURNAL ARTICLE published September 1986 in Computers & Security |
Report says US has backdoor to notes JOURNAL ARTICLE published January 1999 in Computers & Security |
Automated audit — Tools & techniques JOURNAL ARTICLE published January 1995 in Computers & Security |
Special abstract: Study of computer “viruses” and their potential for infecting Commonwealth computer systems JOURNAL ARTICLE published February 1989 in Computers & Security |
European unification '92 impacts on information security JOURNAL ARTICLE published November 1991 in Computers & Security |
Network managers unite over bug JOURNAL ARTICLE published January 1998 in Computers & Security |
Incalculable potential for damage by cyber-terrorism JOURNAL ARTICLE published October 2001 in Computers & Security |
Unlocking virtual private networks JOURNAL ARTICLE published January 1997 in Computers & Security |