default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2003
- Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa. ISSA, Pretoria, South Africa 2003 [contents]
- 2002
- Jacques Botha:
A cyclic approach to Business Continuity Planning. ISSA 2002: 1-11 - Wesley Brandi:
On the Semantic Web and its Web of Trust. ISSA 2002: 1-12 - Simon R. Chudley, Ulrich Ultes-Nitsche:
Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. ISSA 2002: 1-11 - Marijke Coetzee:
Secure Database Connectivity On The WWW. ISSA 2002: 1-10 - Evan James Dembskey:
Quantum Cryptography - Advances in computer science may radically alter cryptography. ISSA 2002: 1-12 - Willem Engelbrecht:
Access control and separation of duty in agent-based workflow environments. ISSA 2002: 1-12 - Petrunel Gerber:
Information Security Health Check. ISSA 2002: 1-12 - Thomas Holz:
An Efficient Intrusion Detection System Design. ISSA 2002: 1-12 - Karin Höne:
Information Security Policy - What do International Information Security Standards say? ISSA 2002: 1-12 - Oliver Andre Hoppe:
Security architecture of the Microsoft .NET framework. ISSA 2002: 1-10 - Lance A. K. Ingram:
Towards a pattern-based approach for achieving semantic integrity in object-relational databases. ISSA 2002: 1-9 - Paula Kotzé:
Feedback And Task Analysis For E-Commerce Sites. ISSA 2002: 1-17 - Marianne Loock:
Minimizing Security Risk Areas revealed by Data mining. ISSA 2002: 1-15 - Adéle Martins:
Assessing Information Security Culture. ISSA 2002: 1-14 - Kim Munro:
Steganography - is it becoming a double-edged sword in computer security? ISSA 2002: 1-17 - Johan Van Niekerk:
A Web-Based Portal For Information Security Education. ISSA 2002: 1-10 - Lindie du Plessis:
Information Security Awareness: Baseline Education and Certification. ISSA 2002: 1-12 - Lizette Robbertze:
Information Security Implementation Methodologies. ISSA 2002: 1-19 - John Rollason, Tom Addison, Kim Munro:
IS Security: User Identification and Authentication - The First Pillar of IS Security. ISSA 2002: 1-15 - Francois Searle:
An Analysis of Anonymity on the Internet. ISSA 2002: 1-13 - Simon Taylor:
Practical Unix Security - Securing IBM's AIX. ISSA 2002: 1-13 - Kerry-Lynn Thomson:
Corporate Governance: Information security the weakest link? ISSA 2002: 1-10 - Ulrich Ultes-Nitsche, InSeon Yoo:
An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. ISSA 2002: 1-12 - Hein S. Venter:
Comparing Intrusion Detection Tools using Generic Vulnerability Categories. ISSA 2002: 1-18 - Karin Venter:
The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. ISSA 2002: 1-13 - Peter Jonathan de Villiers:
Towards a Content-based Billing Model: The Synergy between Access Control and Billing. ISSA 2002: 1-10 - Cheryl Vroom:
Auditing the Employee in the Work Environment with Regard to Information Security. ISSA 2002: 1-11 - Albin Zuccato:
A modified mean value approach to assess security risk. ISSA 2002
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-24 17:28 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint