researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
20
, Issue
8
643
--
656
Bill Hancock
.
Security Views
657
--
666
Stephen Hinde
.
If you can meet with triumph and disaster and treat those two impostors just the same...
667
--
670
Charles Cresson Wood
.
What Do The Recent Terrorist Attacks Mean For The American Information Security Profession?
671
--
675
Denis Zenkin
.
Guidelines for the Protecting the Corporate against Viruse
676
--
683
Enrico Biermann
,
E. Cloete
,
Lucas M. Venter
.
A comparison of Intrusion Detection systems
693
--
714
Joan L. Aron
,
Ronald A. Gove
,
Shiva Azadegan
,
M. Christina Schneider
.
The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model
715
--
723
Gurpreet Dhillon
,
Steve Moore
.
Computer crimes: theorizing about the enemy within
724
--
738
Andres Torrubia
,
Francisco J. Mora
,
Luis Marti
.
Cryptography Regulations for E-commerce and Digital Rights Management
Volume
20
, Issue
7
546
--
560
Bill Hancock
.
Security View
561
--
567
Stephen Hinde
.
Lessons Learned
568
--
572
Stephen Hinde
.
Incalculable potential for damage by cyber-terrorism
573
--
576
Chris Pounder
.
The European Union Proposal for a Policy Towards Network and Information Security
577
--
584
Mariana Gerber
,
Rossouw von Solms
.
From Risk Analysis to Security Requirements
592
--
611
David W. Chadwick
,
Andrew Basden
.
Evaluating Trust in a Public Key Certification Authority
612
--
619
Chu-Hsing Lin
.
Hierarchical key assignment without public-key cryptography
620
--
634
E. Eugene Schultz
,
Robert W. Proctor
,
Mei-Ching Lien
,
Gavriel Salvendy
.
Usability and Security An Appraisal of Usability Issues in Information Security Methods
Volume
20
, Issue
6
451
--
467
Bill Hancock
.
U.S. DoD Puts Up Blocks to Code Red
468
--
474
Stephen Hinde
.
Omnia te adversum spectantia, nulla retorsum:::*:::
475
--
478
August Bequai
.
Organized Crime Goes Cyber
479
--
484
Steve Purser
.
A Simple Graphical Tool For Modelling Trust
485
--
490
Steven Philippsohn
.
Money Laundering on the Internet
491
--
503
Bruce Schneier
.
Managed Security Monitoring: Network Security for the 21st Centur
504
--
508
Basie von Solms
.
Information Security - A Multidimensional Discipline
525
--
532
Reinhardt A. Botha
,
Jan H. P. Eloff
.
Access Control in Document-centric Workflow Systems An Agent-based Approach
533
--
538
Wen-Hung Yeh
,
Jing-Jang Hwang
.
Hiding Digital Information Using a Novel System Scheme
Volume
20
, Issue
5
348
--
363
Bill Hancock
.
Security Views
364
--
371
Stephen Hinde
.
Cyberthreats: Perceptions, Reality and Protection
372
--
373
August Bequai
.
Proprietary Data: Eldorado in Cyber-Space
374
--
379
Richard Barber
.
Security in a Mobile World - is Bluetooth the Answer?
380
--
383
Chris Pounder
.
The Council of Europe Cyber-Crime Convention
384
--
391
C. M. Trompeter
,
Jan H. P. Eloff
.
A Framework for the Implementation of Socio-ethical Controls in Information Security
392
--
394
Thomas W. Cusick
.
Computer Licence Plates
395
--
399
Paul Evans
.
Conference Report - the Global Forum for Law Enforcement and National Security, Edinburgh, 2001
Volume
20
, Issue
4
278
--
294
Bill Hancock
.
Security Views
295
--
301
Stephen Hinde
.
The Weakest Link
302
--
307
Gerald L. Kovacich
.
The Corporate Information Assurance Officer (CIAO)
308
--
310
Basie von Solms
,
Rossouw von Solms
.
Incremental Information Security Certification
311
--
315
Chris Pounder
.
Cyber crime: the backdrop to the Council of Europe Convention
316
--
321
Denis Zenkin
.
Fighting Against the Invisible Enemy - Methods for detecting an unknown virus
Volume
20
, Issue
3
188
--
201
Bill Hancock
.
Security Views
202
--
206
Stephen Hinde
.
The Times They Are A-Changin
207
--
213
Gerald L. Kovacich
.
Protecting 21:::st::: Century Information It s Time for a Change
215
--
218
Basie von Solms
.
Corporate Governance and Information Security
219
--
226
Ivan Horrocks
.
Security Training: Education For an Emerging Profession?
227
--
238
Bob Carter
.
Securing Your Brand In Cyberspace
263
--
270
Michael Frantzen
,
Florian Kerschbaum
,
E. Eugene Schultz
,
Sonia Fahmy
.
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals
Volume
20
, Issue
2
98
--
126
Bill Hancock
.
A Practical Risk
127
--
131
Stephen Hinde
.
The Search For Privacy
132
--
145
Richard Barber
.
The Evolution of Intrusion Detection Systems The Next Step
147
--
154
Adrian Wright
.
Controlling Risks of E-commerce Content
165
--
172
Gurpreet Dhillon
.
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns
173
--
179
Mohammad Peyravian
,
Stephen M. Matyas
,
Allen Roginsky
,
Nevenko Zunic
.
Alternative Method for Unique RSA Primes Generation
Volume
20
, Issue
1
4
--
5
Bill Hancock
.
Y2K & Security A Low Priority Year
5
--
6
Bill Hancock
.
Voodoo is Alive and Well on Your Computer
6
--
7
Bill Hancock
.
Hand-held Virii On The Way
7
--
7
Bill Hancock
.
China Passes Law to Promote Internet Security Supposedly
7
--
7
Bill Hancock
.
Smarter Marines
8
--
9
Bill Hancock
.
Information Warfare Highlighted as a Concern by US Government
8
--
8
Bill Hancock
.
E-tailers Batten Down the Hatches
9
--
10
Bill Hancock
.
E-mail Spammers Jailed
10
--
14
Bill Hancock
.
The Chief Security Officer s Top Ten List for 2001
14
--
15
Bill Hancock
.
Safe Harbor Provision Adopters Few and Far Between
15
--
17
Bill Hancock
.
The Wireless Great Divide But Getting Smaller
17
--
18
Bill Hancock
.
It s a Privacy Thing in 2001
18
--
19
Bill Hancock
.
Fighting SPAM in Europe
19
--
20
Bill Hancock
.
Privacy Advocates Grow in Europe
21
--
27
Stephen Hinde
.
2001: A Privacy Odyssey
28
--
30
August Bequai
.
Software Concerns And The Internet
37
--
41
Robert Graham
.
NIDS Pattern Search vs. Protocol Decode
43
--
52
Andrew Rathmell
.
Protecting Critical Information Infrastructures
53
--
69
Steven Philippsohn
.
Trends In Cybercrime An Overview Of Current Financial Crimes On The Internet
79
--
89
Jovan Dj. Golic
.
How to Construct Cryptographic Primitives from Stream Ciphers