Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 7415 results
Sort by: relevance publication year

A Need for a Network Security Czar

JOURNAL ARTICLE published October 2000 in Computers & Security

Authors: Bill Hancock

Virus is wrapped and all ready for Christmas day

JOURNAL ARTICLE published January 1999 in Computers & Security

Ethernet communication networks. 1978–1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)

JOURNAL ARTICLE published October 1988 in Computers & Security

Can viruses ever be useful?

JOURNAL ARTICLE published April 1991 in Computers & Security

Authors: Harold Thimbleby

Keyjacking: the surprising insecurity of client-side SSL

JOURNAL ARTICLE published March 2005 in Computers & Security

Authors: John Marchesini | S.W. Smith | Meiyuan Zhao

A survey of issues in computer network security

JOURNAL ARTICLE published December 1986 in Computers & Security

Authors: Linda S. Rutledge | Lance J. Hoffman

From the editor

JOURNAL ARTICLE published July 1992 in Computers & Security

Intrusion detection: Approach and performance issues of the SECURENET system

JOURNAL ARTICLE published 1994 in Computers & Security

Authors: Michel Denault | Dimitris Karagiannis | Dimitris Gritzalis | Paul Spirakis

Compsec 2002: the complete security circle

JOURNAL ARTICLE published November 2002 in Computers & Security

Authors: Stephen Hinde

Conference focuses on reduction of software risks

JOURNAL ARTICLE published April 1988 in Computers & Security

Information technology and dataveillance

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland

Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking

JOURNAL ARTICLE published April 1987 in Computers & Security

Authors: J.A.N. Lee | Gerald Segal

Single unit offers Internet security

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Helen Meyer

Planned privacy law weakend

JOURNAL ARTICLE published December 1992 in Computers & Security

International board of referees

JOURNAL ARTICLE published October 1991 in Computers & Security

An adaptive method for anomaly detection in symmetric network traffic

JOURNAL ARTICLE published September 2007 in Computers & Security

Authors: Ming Yu | Xi-Yuan Zhou

A conventional approach to secret balloting in computer networks

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Hwang Jing-Jang

Open systems security: Traps and pitfalls

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Jim Reid

BSA toughens up on pirates

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

How safe is your data

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland