Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp13.bht:"
@article{DBLP:journals/isjgp/Drew05, author = {Steven Drew}, title = {Reducing Enterprise Risk with Effective Threat Management}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {37--42}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86219.6}, doi = {10.1201/1086/44954.13.6.20050101/86219.6}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Drew05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Dunham05, author = {Ken Dunham}, title = {The Power of Intelligence}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {10--14}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86216.3}, doi = {10.1201/1086/44954.13.6.20050101/86216.3}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Dunham05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Freeman05, author = {Edward H. Freeman}, title = {Data Protection and the Commerce Clause}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {5--9}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86215.2}, doi = {10.1201/1086/44954.13.6.20050101/86215.2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Freeman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Hormozi05, author = {Amir M. Hormozi}, title = {Cookies and Privacy}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {51--59}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86221.8}, doi = {10.1201/1086/44954.13.6.20050101/86221.8}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Hormozi05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Master05, author = {Adarbad Master}, title = {Digital Identities Can Tame the Wild, Wild Web}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {15--22}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86217.4}, doi = {10.1201/1086/44954.13.6.20050101/86217.4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Master05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/OHanley05, author = {Richard O'Hanley}, title = {Spyware, Adware, Malware - It's All Sleazeware to Me}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {2--4}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86214.1}, doi = {10.1201/1086/44954.13.6.20050101/86214.1}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/OHanley05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TinsethR05, author = {Andrew Tinseth and Dan Richlin}, title = {{SB1386:} One Year Later}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {43--50}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86220.7}, doi = {10.1201/1086/44954.13.6.20050101/86220.7}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/TinsethR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TrabelsiR05, author = {Zouheir Trabelsi and Hamza Rahmani}, title = {An Anti-Sniffer Based on {ARP} Cache Poisoning Attack}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {6}, pages = {23--36}, year = {2005}, url = {https://doi.org/10.1201/1086/44954.13.6.20050101/86218.5}, doi = {10.1201/1086/44954.13.6.20050101/86218.5}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/TrabelsiR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Akerman04, author = {Nick Akerman}, title = {Protecting Yourself While Protecting Your Computer Data: Two Laws Make It More Important than Ever}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {1}, pages = {12--17}, year = {2004}, url = {https://doi.org/10.1201/1086/44119.13.1.20040301/80430.3}, doi = {10.1201/1086/44119.13.1.20040301/80430.3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Akerman04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BeachamM04, author = {Alyson E. Beacham and Denise Johnson McManus}, title = {Recovery of Financial Services Firms in the World Trade Center, Post 9/11/01}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {2}, pages = {46--55}, year = {2004}, url = {https://doi.org/10.1201/1086/44312.13.2.20040501/81652.7}, doi = {10.1201/1086/44312.13.2.20040501/81652.7}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BeachamM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BreuBHP04, author = {Ruth Breu and Klaus Burger and Michael Hafner and Gerhard Popp}, title = {Towards a Systematic Development of Secure Systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {5--13}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83064.2}, doi = {10.1201/1086/44530.13.3.20040701/83064.2}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BreuBHP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BrinkmanFDHJ04, author = {Richard Brinkman and Ling Feng and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, title = {Efficient Tree Search in Encrypted Data}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {14--21}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83065.3}, doi = {10.1201/1086/44530.13.3.20040701/83065.3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BrinkmanFDHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Chuvakin04a, author = {Anton Chuvakin}, title = {Security Event Analysis through Correlation}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {2}, pages = {13--18}, year = {2004}, url = {https://doi.org/10.1201/1086/44312.13.2.20040501/81648.3}, doi = {10.1201/1086/44312.13.2.20040501/81648.3}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Chuvakin04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Conorich04, author = {Douglas G. Conorich}, title = {Monitoring Intrusion Detection Systems: From Data to Knowledge}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {2}, pages = {19--30}, year = {2004}, url = {https://doi.org/10.1201/1086/44312.13.2.20040501/81649.4}, doi = {10.1201/1086/44312.13.2.20040501/81649.4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Conorich04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Dunham04a, author = {Ken Dunham}, title = {Why SoBig Is So Big}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {1}, pages = {2--7}, year = {2004}, url = {https://doi.org/10.1201/1086/44119.13.1.20040301/80428.1}, doi = {10.1201/1086/44119.13.1.20040301/80428.1}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Dunham04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Dunham04b, author = {Ken Dunham}, title = {Phishing Isn't So Sophisticated: Scary!}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {2}, pages = {2--7}, year = {2004}, url = {https://doi.org/10.1201/1086/44312.13.2.20040501/81646.1}, doi = {10.1201/1086/44312.13.2.20040501/81646.1}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Dunham04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Dunham04c, author = {Ken Dunham}, title = {Mydoom Miseries}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {4}, pages = {2--5}, year = {2004}, url = {https://doi.org/10.1201/1086/44640.13.4.20040901/83726.1}, doi = {10.1201/1086/44640.13.4.20040901/83726.1}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Dunham04c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Ferson04, author = {Patricia Ferson}, title = {I'll Take an Order of Data Sensitivity with Some Integrity on the Side: Finding a Balance within Access Control Models}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {4}, pages = {22--25}, year = {2004}, url = {https://doi.org/10.1201/1086/44640.13.4.20040901/83729.4}, doi = {10.1201/1086/44640.13.4.20040901/83729.4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Ferson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Freeman04a, author = {Edward H. Freeman}, title = {Source Code Escrow}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {1}, pages = {8--11}, year = {2004}, url = {https://doi.org/10.1201/1086/44119.13.1.20040301/80429.2}, doi = {10.1201/1086/44119.13.1.20040301/80429.2}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Freeman04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Freeman04b, author = {Edward H. Freeman}, title = {Digital Signatures and Electronic Contracts}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {2}, pages = {8--12}, year = {2004}, url = {https://doi.org/10.1201/1086/44312.13.2.20040501/81647.2}, doi = {10.1201/1086/44312.13.2.20040501/81647.2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Freeman04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Freeman04c, author = {Edward H. Freeman}, title = {Corporate Liability for Illegal Downloading of Copyrighted Music}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {4}, pages = {6--10}, year = {2004}, url = {https://doi.org/10.1201/1086/44640.13.4.20040901/83727.2}, doi = {10.1201/1086/44640.13.4.20040901/83727.2}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Freeman04c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Freeman04d, author = {Edward H. Freeman}, title = {Document Theft: Appropriate Responses}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {5}, pages = {4--8}, year = {2004}, url = {https://doi.org/10.1201/1086/44797.13.5.20041101/84904.2}, doi = {10.1201/1086/44797.13.5.20041101/84904.2}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Freeman04d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Geffert04, author = {Brian T. Geffert}, title = {Incorporating {HIPAA} Security Requirements into an Enterprise Security Program}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {5}, pages = {21--28}, year = {2004}, url = {https://doi.org/10.1201/1086/44797.13.5.20041101/84906.4}, doi = {10.1201/1086/44797.13.5.20041101/84906.4}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Geffert04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Ghosh04, author = {Sumit Ghosh}, title = {The Nature of Cyber-attacks in the Future: {A} Position Paper}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {1}, pages = {18--33}, year = {2004}, url = {https://doi.org/10.1201/1086/44119.13.1.20040301/80431.4}, doi = {10.1201/1086/44119.13.1.20040301/80431.4}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Ghosh04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GutierrezFP04, author = {Carlos Guti{\'{e}}rrez and Eduardo Fern{\'{a}}ndez{-}Medina and Mario Piattini}, title = {Web Services Security: Is the Problem Solved?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {22--31}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83066.4}, doi = {10.1201/1086/44530.13.3.20040701/83066.4}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GutierrezFP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Hernandez-GoyaC04, author = {Candelaria Hern{\'{a}}ndez{-}Goya and Pino Caballero{-}Gil}, title = {A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {1}, pages = {34--43}, year = {2004}, url = {https://doi.org/10.1201/1086/44119.13.1.20040301/80432.5}, doi = {10.1201/1086/44119.13.1.20040301/80432.5}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Hernandez-GoyaC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/HovavD04, author = {Anat Hovav and John D'Arcy}, title = {The Impact of Virus Attack Announcements on the Market Value of Firms}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {32--40}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83067.5}, doi = {10.1201/1086/44530.13.3.20040701/83067.5}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/HovavD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/JonesR04, author = {Russell L. Jones and Abhinav Rastogi}, title = {Secure Coding: Building Security into the Software Development Life Cycle}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {5}, pages = {29--39}, year = {2004}, url = {https://doi.org/10.1201/1086/44797.13.5.20041101/84907.5}, doi = {10.1201/1086/44797.13.5.20041101/84907.5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/JonesR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Main04, author = {Alec Main}, title = {Application Security: Building in Security during the Development Stage}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {2}, pages = {31--37}, year = {2004}, url = {https://doi.org/10.1201/1086/44312.13.2.20040501/81650.5}, doi = {10.1201/1086/44312.13.2.20040501/81650.5}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Main04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Mehta04, author = {Raju Mehta}, title = {Oracle Database Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {5}, pages = {40--52}, year = {2004}, url = {https://doi.org/10.1201/1086/44797.13.5.20041101/84908.6}, doi = {10.1201/1086/44797.13.5.20041101/84908.6}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Mehta04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MunozCCG04, author = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jes{\'{u}}s Carretero and F{\'{e}}lix Garc{\'{\i}}a}, title = {Filtering Spam at E-Mail Server Level with Improved {CRM114}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {48--55}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83069.7}, doi = {10.1201/1086/44530.13.3.20040701/83069.7}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MunozCCG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Nemzow04, author = {Martin Nemzow}, title = {Creating and Implementing {MS} Office Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {4}, pages = {26--38}, year = {2004}, url = {https://doi.org/10.1201/1086/44640.13.4.20040901/83730.5}, doi = {10.1201/1086/44640.13.4.20040901/83730.5}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Nemzow04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/OHanley04, author = {Richard O'Hanley}, title = {Maintaining Security and Privacy Requires Getting "Back to Basics"}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {5}, pages = {2--3}, year = {2004}, url = {https://doi.org/10.1201/1086/44797.13.5.20041101/84903.1}, doi = {10.1201/1086/44797.13.5.20041101/84903.1}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/OHanley04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Peltier04, author = {Thomas R. Peltier}, title = {Developing an Enterprisewide Policy Structure}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {1}, pages = {44--50}, year = {2004}, url = {https://doi.org/10.1201/1086/44119.13.1.20040301/80433.6}, doi = {10.1201/1086/44119.13.1.20040301/80433.6}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Peltier04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Peltier04a, author = {Thomas R. Peltier}, title = {Risk Analysis and Risk Management}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {4}, pages = {44--56}, year = {2004}, url = {https://doi.org/10.1201/1086/44640.13.4.20040901/83732.7}, doi = {10.1201/1086/44640.13.4.20040901/83732.7}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Peltier04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Saunier04, author = {Louisa Saunier}, title = {The Twelve Principles of Trusted Solutions}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {2}, pages = {38--45}, year = {2004}, url = {https://doi.org/10.1201/1086/44312.13.2.20040501/81651.6}, doi = {10.1201/1086/44312.13.2.20040501/81651.6}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Saunier04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Stephenson04, author = {Peter Stephenson}, title = {Forensic Analysis of Risks in Enterprise Systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {4}, pages = {11--21}, year = {2004}, url = {https://doi.org/10.1201/1086/44640.13.4.20040901/83728.3}, doi = {10.1201/1086/44640.13.4.20040901/83728.3}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Stephenson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ThomasE04, author = {J. Thomas and Adam J. Elbirt}, title = {Understanding Internet Protocol Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {4}, pages = {39--43}, year = {2004}, url = {https://doi.org/10.1201/1086/44640.13.4.20040901/83731.6}, doi = {10.1201/1086/44640.13.4.20040901/83731.6}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ThomasE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Wolf04, author = {Laurence J. Wolf}, title = {Preventing Failure: The Value of Performing a Single Point of Failure Analysis for Critical Applications and Systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {1}, pages = {51--54}, year = {2004}, url = {https://doi.org/10.1201/1086/44119.13.1.20040301/80434.7}, doi = {10.1201/1086/44119.13.1.20040301/80434.7}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Wolf04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Wolf04a, author = {Laurence J. Wolf}, title = {Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness of the Incident Management Process}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {5}, pages = {9--20}, year = {2004}, url = {https://doi.org/10.1201/1086/44797.13.5.20041101/84905.3}, doi = {10.1201/1086/44797.13.5.20041101/84905.3}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Wolf04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ZhaoVB04, author = {Weiliang Zhao and Vijay Varadharajan and George Bryan}, title = {Fair Trading Protocol with Offline Anonymous Credit Card Payment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {41--47}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83068.6}, doi = {10.1201/1086/44530.13.3.20040701/83068.6}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ZhaoVB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.