Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 7428 results
Sort by: relevance publication year

More options for physical access control

JOURNAL ARTICLE published May 1990 in Computers & Security

Authors: Charlotte Klopp

Security Views - Malware Update

JOURNAL ARTICLE published February 2007 in Computers & Security

In this issue…

JOURNAL ARTICLE published March 1986 in Computers & Security

Authors: Harold Joseph Highland

Site Spoofing Becomes More Popular

JOURNAL ARTICLE published November 2000 in Computers & Security

Authors: Bill Hancock

Towards a causality based analysis of anonymity protection in indeterministic mix systems

JOURNAL ARTICLE published June 2017 in Computers & Security

Authors: Dang Vinh Pham | Dogan Kesdogan

Privacy Advocates Grow in Europe

JOURNAL ARTICLE published January 2001 in Computers & Security

Authors: Bill Hancock

Protection on the web

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Facing the challenge of IT security

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Martin Smith

RSA goes down under to dodge export laws

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

A framework for quantitative evaluation of parallel control-flow obfuscation

JOURNAL ARTICLE published November 2012 in Computers & Security

Authors: Yu-Lun Huang | Hsin-Yi Tsai

Does Microsoft have security all locked up?

JOURNAL ARTICLE published January 1996 in Computers & Security

PGP V5.0 Keys Potentially Insecure

JOURNAL ARTICLE published July 2000 in Computers & Security

Authors: Bill Hancock

Editorial Board

JOURNAL ARTICLE published August 2018 in Computers & Security

Design and administration of distributed and hierarchical information networks under partial orderings

JOURNAL ARTICLE published June 1987 in Computers & Security

Authors: Fred Cohen

Congestion control in routing networks

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: A.A. Chien

Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines

JOURNAL ARTICLE published May 2016 in Computers & Security

Authors: Cihan Ulaş | Ulaş Aşık | Cantürk Karadeniz

Security Training: Education For an Emerging Profession?

JOURNAL ARTICLE published May 2001 in Computers & Security

Authors: Ivan Horrocks

Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation

JOURNAL ARTICLE published September 2021 in Computers & Security

Authors: Jing Lin | Kaiqi Xiong

MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization

JOURNAL ARTICLE published January 2023 in Computers & Security

Authors: Jafar Haadi Jafarian | Amirreza Niakanlahiji

On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms

JOURNAL ARTICLE published June 2021 in Computers & Security

Authors: Lu Yu | Yu Fu | Jonathan Oakley | Oluwakemi Hambolu | Richard Brooks