Search dblp for Publications

export results for "toc:db/journals/istr/istr7.bht:"

 download as .bib file

@article{DBLP:journals/istr/Boeckman02,
  author       = {Chuck Boeckman},
  title        = {Securing the Shell - Implementing a Host Level Default Deny Policy},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {1},
  pages        = {57--62},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00106-1},
  doi          = {10.1016/S1363-4127(02)00106-1},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Boeckman02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Branigan02,
  author       = {Steve Branigan},
  title        = {Securing the Critical {IP} Infrastructure},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {57--64},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02007-1},
  doi          = {10.1016/S1363-4127(02)02007-1},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Branigan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ciechanowicz02,
  author       = {Chez Ciechanowicz},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {1},
  pages        = {1},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00101-2},
  doi          = {10.1016/S1363-4127(02)00101-2},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ciechanowicz02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ciechanowicz02a,
  author       = {Chez Ciechanowicz},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {1},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02001-0},
  doi          = {10.1016/S1363-4127(02)02001-0},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ciechanowicz02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ciechanowicz02b,
  author       = {Chez Ciechanowicz},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {4},
  pages        = {1},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00401-6},
  doi          = {10.1016/S1363-4127(02)00401-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ciechanowicz02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DaltonCN02,
  author       = {Chris I. Dalton and
                  Tse Huong Choo and
                  Andrew P. Norman},
  title        = {Design of Secure Unix},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {1},
  pages        = {37--56},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00105-X},
  doi          = {10.1016/S1363-4127(02)00105-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DaltonCN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Desmedt02,
  author       = {Yvo Desmedt},
  title        = {Is there a Need for Survivable Computation in Critical Infrastructures?},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {11--21},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02003-4},
  doi          = {10.1016/S1363-4127(02)02003-4},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Desmedt02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Flink02,
  author       = {Yona Flink},
  title        = {Who holds the key to {IT} security?},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {4},
  pages        = {10--22},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00403-X},
  doi          = {10.1016/S1363-4127(02)00403-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Flink02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Guel02,
  author       = {Michele D. Guel},
  title        = {A Framework for Choosing Your Next Generation Authentication/Authorization
                  System},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {1},
  pages        = {63--78},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00107-3},
  doi          = {10.1016/S1363-4127(02)00107-3},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Guel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Jones02,
  author       = {Andy Jones},
  title        = {Protecting the Critical National Infrastructure - Developing a Method
                  for the Measurement of Threat Agents in an Information Environment},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {22--36},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02004-6},
  doi          = {10.1016/S1363-4127(02)02004-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Jones02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mellander02,
  author       = {Jim Mellander},
  title        = {Unix Filesystem Security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {1},
  pages        = {11--25},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00103-6},
  doi          = {10.1016/S1363-4127(02)00103-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Mellander02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NixonCSG02,
  author       = {Mark S. Nixon and
                  John N. Carter and
                  Jamie D. Shutler and
                  Michael G. Grant},
  title        = {New Advances in Automatic Gait Recognition},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {4},
  pages        = {23--35},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00404-1},
  doi          = {10.1016/S1363-4127(02)00404-1},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NixonCSG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Rak02,
  author       = {{\'{A}}d{\'{a}}m R{\'{a}}k},
  title        = {Information Sharing in the Cyber Age: a Key to Critical Infrastructure
                  Protection},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {50--56},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02006-X},
  doi          = {10.1016/S1363-4127(02)02006-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Rak02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Schuckers02,
  author       = {Stephanie A. C. Schuckers},
  title        = {Spoofing and Anti-Spoofing Measures},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {4},
  pages        = {56--62},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00407-7},
  doi          = {10.1016/S1363-4127(02)00407-7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Schuckers02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Soutar02,
  author       = {Colin Soutar},
  title        = {Implementation of Biometric Systems - Security and Privacy Considerations},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {4},
  pages        = {49--55},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00406-5},
  doi          = {10.1016/S1363-4127(02)00406-5},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Soutar02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Steinberger02,
  author       = {Richard Steinberger},
  title        = {Vulnerability Management in Unix Environments},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {1},
  pages        = {26--36},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00104-8},
  doi          = {10.1016/S1363-4127(02)00104-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Steinberger02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Tilton02,
  author       = {Catherine J. Tilton},
  title        = {Biometric Standards - An Overview},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {4},
  pages        = {36--48},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)00405-3},
  doi          = {10.1016/S1363-4127(02)00405-3},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Tilton02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ToddCA02,
  author       = {Mike Todd and
                  Carl Colwill and
                  Dave Allen},
  title        = {Benchmarking for Critical Infrastructure Protection},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {37--49},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02005-8},
  doi          = {10.1016/S1363-4127(02)02005-8},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ToddCA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Whittaker02,
  author       = {Colin Whittaker},
  title        = {The {UK} Financial Sector's Place in the Critical National Infrastructure},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {65--74},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02008-3},
  doi          = {10.1016/S1363-4127(02)02008-3},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Whittaker02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}