Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 7424 results
Sort by: relevance publication year

Detecting network intruders

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

Discussing security with top management

JOURNAL ARTICLE published April 1988 in Computers & Security

Authors: William A.J. Bound

International board of referees

JOURNAL ARTICLE published January 1994 in Computers & Security

IFIP technical committee 11

JOURNAL ARTICLE published December 1990 in Computers & Security

A DOS-based POset implementation

JOURNAL ARTICLE published October 1991 in Computers & Security

Authors: Frederick B. Cohen

Protecting The Web Server And Applications

JOURNAL ARTICLE published January 2001 in Computers & Security

Authors: Iain Franklin

Hardware, software security devices protect PCs and inside information

JOURNAL ARTICLE published April 1988 in Computers & Security

In brief

JOURNAL ARTICLE published October 2002 in Computers & Security

Authors: Brian McKenna | Sarah Hilley

Protection of information in electronic systems

JOURNAL ARTICLE published December 1986 in Computers & Security

Securing peer-assisted indoor localization leveraging acoustic ranging

JOURNAL ARTICLE published March 2019 in Computers & Security

Research funded by National Natural Science Foundation of China (61425024,61402223,61321491,61300235)

Authors: Shaoyong Du | Jingyu Hua | Sheng Zhong

Security views

JOURNAL ARTICLE published September 2005 in Computers & Security

Authors: E. Schultz

Trusted ORACLE—multilevel secure data management for military computing

JOURNAL ARTICLE published May 1991 in Computers & Security

Authors: R.J. Allen

Photon protection

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Suppliers are biggest virus carriers

JOURNAL ARTICLE published December 1992 in Computers & Security

‘Safe Harbor’ Provision Adopters Few and Far Between

JOURNAL ARTICLE published January 2001 in Computers & Security

Authors: Bill Hancock

Corrigendum to “Optiwords: A new password policy for creating memorable and strong password” [Computers & Security, Volume 85, 2019, Pages 423-435]

JOURNAL ARTICLE published July 2020 in Computers & Security

Authors: Yimin Guo | Zhenfeng Zhang | Yajun Guo

Holding the fort

JOURNAL ARTICLE published January 1997 in Computers & Security

Floppy diskette security measures

JOURNAL ARTICLE published September 1985 in Computers & Security

Authors: Charles Cresson Wood

Key concerns in a review of CAACF2/MVS

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Norman Crocker

Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms

JOURNAL ARTICLE published April 2022 in Computers & Security

Authors: Alejandra Castelblanco | Esteban Rivera | Jesús Solano | Lizzy Tengana | Christian López | Martín Ochoa