1 | -- | 23 | Almut Herzog, Nahid Shahmehri, Claudiu Duma. An Ontology of Information Security |
24 | -- | 46 | Amr Ali Eldin, René W. Wagenaar. Towards Autonomous User Privacy Control |
47 | -- | 61 | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham. E-Mail Worm Detection Using Data Mining |
62 | -- | 74 | Norman Pendegraft, Mark Rounds. A Simulation Model of Information Systems Security |
75 | -- | 86 | Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Hajin Hwang. Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions |