default search action
E. Eugene Schultz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [r4]E. Eugene Schultz:
Firewalls: Internet Security. Encyclopedia of Information Assurance 2011 - [r3]E. Eugene Schultz:
Malicious Code: Rootkits. Encyclopedia of Information Assurance 2011 - [r2]E. Eugene Schultz:
Security Information and Event Management (SIEM). Encyclopedia of Information Assurance 2011 - [r1]E. Eugene Schultz, Eugene H. Spafford:
Intrusion Detection Systems (IDSs): Implementation. Encyclopedia of Information Assurance 2011
2000 – 2009
- 2007
- [j70]E. Eugene Schultz:
What infosec changes are likely to result from the recent US election? Comput. Secur. 26(1): 1-2 (2007) - [j69]E. Eugene Schultz:
Windows Vista: Microsoft's brave new world. Comput. Secur. 26(2): 99 (2007) - [j68]E. Eugene Schultz:
Mobile computing: The next Pandora's Box. Comput. Secur. 26(3): 187 (2007) - [j67]E. Eugene Schultz:
Struggles in the academic side of infosec. Comput. Secur. 26(4): 267-268 (2007) - [j66]Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bhargav-Spantzel, Bik-Lam (Belin) Tai, Joshua Cook, E. Eugene Schultz:
Improving password security and memorability to protect personal and organizational information. Int. J. Hum. Comput. Stud. 65(8): 744-757 (2007) - [j65]E. Eugene Schultz:
Risks due to convergence of physical security systems and information technology environments. Inf. Secur. Tech. Rep. 12(2): 80-84 (2007) - 2006
- [j64]E. Eugene Schultz:
Dilemmas and boundaries of digital rights management. Comput. Secur. 25(1): 1-2 (2006) - [j63]E. Eugene Schultz:
About "Unofficial patches". Comput. Secur. 25(2): 79-80 (2006) - [j62]E. Eugene Schultz:
Special systems: Overlooked sources of security risk? Comput. Secur. 25(3): 155 (2006) - [j61]E. Eugene Schultz:
Representing information security fairly and accurately. Comput. Secur. 25(4): 237 (2006) - [j60]E. Eugene Schultz:
The changing winds of information security. Comput. Secur. 25(5): 315-316 (2006) - [j59]E. Eugene Schultz:
Microsoft is back in the hot seat. Comput. Secur. 25(6): 393-394 (2006) - [j58]E. Eugene Schultz:
Issues concerning the distribution of vulnerability information. Comput. Secur. 25(7): 475-476 (2006) - [j57]E. Eugene Schultz:
Predicting the future of InfoSec. Comput. Secur. 25(8): 553-554 (2006) - 2005
- [j56]E. Eugene Schultz:
Search engines: a growing contributor to security risk. Comput. Secur. 24(2): 87-88 (2005) - [j55]E. Eugene Schultz:
Lycos crosses the line. Comput. Secur. 24(2): 89-90 (2005) - [j54]E. Eugene Schultz:
Security dilemmas with Microsoft's Internet Explorer. Comput. Secur. 24(3): 175-176 (2005) - [j53]E. Eugene Schultz:
Personal information compromises: It is time for the U.S. Government to wake up. Comput. Secur. 24(4): 261-262 (2005) - [j52]E. Eugene Schultz:
Non-infosec professionals in infosec? Comput. Secur. 24(5): 347-348 (2005) - [j51]E. Eugene Schultz:
Security views. Comput. Secur. 24(5): 349-358 (2005) - [j50]E. Eugene Schultz:
The human factor in security. Comput. Secur. 24(6): 425-426 (2005) - [j49]E. Eugene Schultz:
Security views. Comput. Secur. 24(6): 427-436 (2005) - [j48]E. Eugene Schultz:
Aligning disaster recovery and security incident response. Comput. Secur. 24(7): 505-506 (2005) - [j47]E. Eugene Schultz:
Infosec certification: Which way do we turn from here? Comput. Secur. 24(8): 587-588 (2005) - [j46]E. Eugene Schultz:
Security views. Comput. Secur. 24(8): 589-598 (2005) - 2004
- [j45]E. Eugene Schultz:
Security training and awareness - fitting a square peg in a round hole. Comput. Secur. 23(1): 1-2 (2004) - [j44]E. Eugene Schultz:
Incident response teams need to change. Comput. Secur. 23(2): 87-88 (2004) - [j43]E. Eugene Schultz:
Worms and viruses: are we losing control? Comput. Secur. 23(3): 179-180 (2004) - [j42]E. Eugene Schultz:
Security views. Comput. Secur. 23(3): 181-190 (2004) - [j41]E. Eugene Schultz:
Intrusion prevention. Comput. Secur. 23(4): 265-266 (2004) - [j40]E. Eugene Schultz:
Security views. Comput. Secur. 23(4): 267-274 (2004) - [j39]E. Eugene Schultz:
Sarbanes-Oxley - a huge boon to information security in the US. Comput. Secur. 23(5): 353-354 (2004) - [j38]E. Eugene Schultz:
Security views. Comput. Secur. 23(5): 355-361 (2004) - [j37]E. Eugene Schultz:
The case for one-time credentials. Comput. Secur. 23(6): 441-442 (2004) - [j36]E. Eugene Schultz:
The gap between cryptography and information security: has it narrowed? Comput. Secur. 23(7): 531-532 (2004) - [j35]E. Eugene Schultz:
Security views. Comput. Secur. 23(7): 533-541 (2004) - [j34]E. Eugene Schultz:
Is the U.S. government really getting serious about information security? Comput. Secur. 23(8): 621-622 (2004) - 2003
- [j33]E. Eugene Schultz:
Security views. Comput. Secur. 22(1): 4-13 (2003) - [j32]E. Eugene Schultz:
Internet security: what's in the future? Comput. Secur. 22(2): 78-79 (2003) - [j31]E. Eugene Schultz:
Security Views. Comput. Secur. 22(2): 80-89 (2003) - [j30]Jesper M. Johansson, E. Eugene Schultz:
Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions. Comput. Secur. 22(2): 152-159 (2003) - [j29]E. Eugene Schultz:
Security views. Comput. Secur. 22(3): 176-187 (2003) - [j28]Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls. Comput. Secur. 22(3): 214-232 (2003) - [j27]E. Eugene Schultz:
Why can't Microsoft stay out of the InfoSec headlines? Comput. Secur. 22(4): 270-272 (2003) - [j26]E. Eugene Schultz:
Attackers hit Web hosting servers. Comput. Secur. 22(4): 273-283 (2003) - [j25]E. Eugene Schultz:
Pandora's Box: spyware, adware, autoexecution, and NGSCB. Comput. Secur. 22(5): 366-367 (2003) - [j24]E. Eugene Schultz:
Security Views. Comput. Secur. 22(5): 368-377 (2003) - [j23]E. Eugene Schultz:
Security views: Online piracy battle heats up in US. Comput. Secur. 22(6): 464-473 (2003) - [j22]E. Eugene Schultz:
Patching Pandemonium. Comput. Secur. 22(7): 556-558 (2003) - [j21]E. Eugene Schultz:
Information security and the media. Comput. Secur. 22(8): 652-653 (2003) - [j20]E. Eugene Schultz:
Security views. Comput. Secur. 22(8): 654-663 (2003) - 2002
- [j19]E. Eugene Schultz:
Security Views. Comput. Secur. 21(1): 5-15 (2002) - [j18]E. Eugene Schultz:
Security Views. Comput. Secur. 21(2): 101-112 (2002) - [j17]E. Eugene Schultz:
Security Views. Comput. Secur. 21(3): 201-211 (2002) - [j16]E. Eugene Schultz:
The Sorry State of Law Enforcement. Comput. Secur. 21(4): 290-292 (2002) - [j15]E. Eugene Schultz:
Security views. Comput. Secur. 21(4): 293-302 (2002) - [j14]E. Eugene Schultz:
Taking a stand on hackers. Comput. Secur. 21(5): 382-384 (2002) - [j13]E. Eugene Schultz:
Security Views. Comput. Secur. 21(5): 385-396 (2002) - [j12]E. Eugene Schultz:
Security Views. Comput. Secur. 21(6): 481-490 (2002) - [j11]E. Eugene Schultz:
A framework for understanding and predicting insider attacks. Comput. Secur. 21(6): 526-531 (2002) - [j10]E. Eugene Schultz:
The US Government bigger and better information security? Comput. Secur. 21(7): 578-580 (2002) - [j9]E. Eugene Schultz:
Security Views. Comput. Secur. 21(7): 581-590 (2002) - [j8]E. Eugene Schultz:
The gap between cryptography and information security. Comput. Secur. 21(8): 674-67 (2002) - [j7]E. Eugene Schultz:
Security Views. Comput. Secur. 21(8): 677-688 (2002) - 2001
- [j6]Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy:
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. Comput. Secur. 20(3): 263-270 (2001) - [j5]E. Eugene Schultz, Robert W. Proctor, Mei-Ching Lien, Gavriel Salvendy:
Usability and Security An Appraisal of Usability Issues in Information Security Methods. Comput. Secur. 20(7): 620-634 (2001)
1990 – 1999
- 1999
- [j4]E. Eugene Schultz:
Windows NT security: Kudos, concerns, and prescriptions. Comput. Secur. 18(3): 204-210 (1999) - 1993
- [j3]Thomas A. Longstaff, E. Eugene Schultz:
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. Comput. Secur. 12(1): 61-77 (1993) - 1992
- [j2]E. Eugene Schultz:
Hawaii international conference on system sciences. ACM SIGCHI Bull. 24(3): 24-29 (1992)
1980 – 1989
- 1986
- [j1]E. Eugene Schultz, Patrick S. Curran:
Menu Structure and Ordering of Menu Selection: Independent or Interactive effects? ACM SIGCHI Bull. 18(2): 69-71 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint