Facet browsing currently unavailable
Page 10 of 7424 results
Sort by: relevance publication year
Detecting network intruders JOURNAL ARTICLE published January 1997 in Computers & Security |
Discussing security with top management JOURNAL ARTICLE published April 1988 in Computers & Security |
International board of referees JOURNAL ARTICLE published January 1994 in Computers & Security |
IFIP technical committee 11 JOURNAL ARTICLE published December 1990 in Computers & Security |
A DOS-based POset implementation JOURNAL ARTICLE published October 1991 in Computers & Security |
Protecting The Web Server And Applications JOURNAL ARTICLE published January 2001 in Computers & Security |
Hardware, software security devices protect PCs and inside information JOURNAL ARTICLE published April 1988 in Computers & Security |
In brief JOURNAL ARTICLE published October 2002 in Computers & Security |
Protection of information in electronic systems JOURNAL ARTICLE published December 1986 in Computers & Security |
Securing peer-assisted indoor localization leveraging acoustic ranging JOURNAL ARTICLE published March 2019 in Computers & Security Research funded by National Natural Science Foundation of China (61425024,61402223,61321491,61300235) |
Security views JOURNAL ARTICLE published September 2005 in Computers & Security |
Trusted ORACLE—multilevel secure data management for military computing JOURNAL ARTICLE published May 1991 in Computers & Security |
Photon protection JOURNAL ARTICLE published January 1996 in Computers & Security |
Suppliers are biggest virus carriers JOURNAL ARTICLE published December 1992 in Computers & Security |
‘Safe Harbor’ Provision Adopters Few and Far Between JOURNAL ARTICLE published January 2001 in Computers & Security |
Corrigendum to “Optiwords: A new password policy for creating memorable and strong password” [Computers & Security, Volume 85, 2019, Pages 423-435] JOURNAL ARTICLE published July 2020 in Computers & Security |
Holding the fort JOURNAL ARTICLE published January 1997 in Computers & Security |
Floppy diskette security measures JOURNAL ARTICLE published September 1985 in Computers & Security |
Key concerns in a review of CAACF2/MVS JOURNAL ARTICLE published January 1997 in Computers & Security |
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms JOURNAL ARTICLE published April 2022 in Computers & Security |