default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr7.bht:"
@article{DBLP:journals/istr/Boeckman02, author = {Chuck Boeckman}, title = {Securing the Shell - Implementing a Host Level Default Deny Policy}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {1}, pages = {57--62}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00106-1}, doi = {10.1016/S1363-4127(02)00106-1}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Boeckman02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Branigan02, author = {Steve Branigan}, title = {Securing the Critical {IP} Infrastructure}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {57--64}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02007-1}, doi = {10.1016/S1363-4127(02)02007-1}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Branigan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ciechanowicz02, author = {Chez Ciechanowicz}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {1}, pages = {1}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00101-2}, doi = {10.1016/S1363-4127(02)00101-2}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ciechanowicz02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ciechanowicz02a, author = {Chez Ciechanowicz}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {1}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02001-0}, doi = {10.1016/S1363-4127(02)02001-0}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ciechanowicz02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ciechanowicz02b, author = {Chez Ciechanowicz}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {4}, pages = {1}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00401-6}, doi = {10.1016/S1363-4127(02)00401-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ciechanowicz02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DaltonCN02, author = {Chris I. Dalton and Tse Huong Choo and Andrew P. Norman}, title = {Design of Secure Unix}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {1}, pages = {37--56}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00105-X}, doi = {10.1016/S1363-4127(02)00105-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DaltonCN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Desmedt02, author = {Yvo Desmedt}, title = {Is there a Need for Survivable Computation in Critical Infrastructures?}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {11--21}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02003-4}, doi = {10.1016/S1363-4127(02)02003-4}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Desmedt02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Flink02, author = {Yona Flink}, title = {Who holds the key to {IT} security?}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {4}, pages = {10--22}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00403-X}, doi = {10.1016/S1363-4127(02)00403-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Flink02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Guel02, author = {Michele D. Guel}, title = {A Framework for Choosing Your Next Generation Authentication/Authorization System}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {1}, pages = {63--78}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00107-3}, doi = {10.1016/S1363-4127(02)00107-3}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Guel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Jones02, author = {Andy Jones}, title = {Protecting the Critical National Infrastructure - Developing a Method for the Measurement of Threat Agents in an Information Environment}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {22--36}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02004-6}, doi = {10.1016/S1363-4127(02)02004-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Jones02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mellander02, author = {Jim Mellander}, title = {Unix Filesystem Security}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {1}, pages = {11--25}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00103-6}, doi = {10.1016/S1363-4127(02)00103-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Mellander02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NixonCSG02, author = {Mark S. Nixon and John N. Carter and Jamie D. Shutler and Michael G. Grant}, title = {New Advances in Automatic Gait Recognition}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {4}, pages = {23--35}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00404-1}, doi = {10.1016/S1363-4127(02)00404-1}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NixonCSG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Rak02, author = {{\'{A}}d{\'{a}}m R{\'{a}}k}, title = {Information Sharing in the Cyber Age: a Key to Critical Infrastructure Protection}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {50--56}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02006-X}, doi = {10.1016/S1363-4127(02)02006-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Rak02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Schuckers02, author = {Stephanie A. C. Schuckers}, title = {Spoofing and Anti-Spoofing Measures}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {4}, pages = {56--62}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00407-7}, doi = {10.1016/S1363-4127(02)00407-7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Schuckers02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Soutar02, author = {Colin Soutar}, title = {Implementation of Biometric Systems - Security and Privacy Considerations}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {4}, pages = {49--55}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00406-5}, doi = {10.1016/S1363-4127(02)00406-5}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Soutar02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Steinberger02, author = {Richard Steinberger}, title = {Vulnerability Management in Unix Environments}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {1}, pages = {26--36}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00104-8}, doi = {10.1016/S1363-4127(02)00104-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Steinberger02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Tilton02, author = {Catherine J. Tilton}, title = {Biometric Standards - An Overview}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {4}, pages = {36--48}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)00405-3}, doi = {10.1016/S1363-4127(02)00405-3}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Tilton02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ToddCA02, author = {Mike Todd and Carl Colwill and Dave Allen}, title = {Benchmarking for Critical Infrastructure Protection}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {37--49}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02005-8}, doi = {10.1016/S1363-4127(02)02005-8}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ToddCA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Whittaker02, author = {Colin Whittaker}, title = {The {UK} Financial Sector's Place in the Critical National Infrastructure}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {65--74}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02008-3}, doi = {10.1016/S1363-4127(02)02008-3}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Whittaker02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.