Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             10 results found
no title author magazine year volume issue page(s) type
1 A preliminary model of end user sophistication for insider threat prediction in IT systems Magklaras, G.B.
2005
24 5 p. 371-380
10 p.
article
2 Capital market reaction to defective IT products: The case of computer viruses Hovav, Anat
2005
24 5 p. 409-424
16 p.
article
3 CIDS: An agent-based intrusion detection system Dasgupta, D.
2005
24 5 p. 387-398
12 p.
article
4 Non-infosec professionals in infosec? Schultz, Eugene
2005
24 5 p. 347-348
2 p.
article
5 Recent attacks on alleged SecurID and their practical implications Biryukov, Alex
2005
24 5 p. 364-370
7 p.
article
6 Secure authentication scheme for session initiation protocol Yang, Chou-Chen
2005
24 5 p. 381-386
6 p.
article
7 Security views Schultz, E.
2005
24 5 p. 349-358
10 p.
article
8 Technology evolution drives need for greater information technology security LeVine, Richard
2005
24 5 p. 359-361
3 p.
article
9 The five Ps of patch management Andrew, C.
2005
24 5 p. 362-363
2 p.
article
10 Two-level controllers hierarchy for a scalable and distributed multicast security protocol Aslan, Heba K.
2005
24 5 p. 399-408
10 p.
article
                             10 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands