Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp19.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/AdaneS10,
  author       = {Dattatraya S. Adane and
                  S. R. Sathe},
  title        = {A Security Model for Securing Data in Multiagent Applications},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {1},
  pages        = {11--21},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903534088},
  doi          = {10.1080/19393550903534088},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AdaneS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ArunmozhiV10,
  author       = {S. A. Arunmozhi and
                  Y. Venkataramani},
  title        = {A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks
                  in Mobile Ad-hoc Networks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {5},
  pages        = {263--272},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514651},
  doi          = {10.1080/19393555.2010.514651},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ArunmozhiV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Atyam10,
  author       = {Satyanandan B. Atyam},
  title        = {Effectiveness of Security Control Risk Assessments for Enterprises:
                  Assess on the Business Perspective of Security Risks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {6},
  pages        = {343--350},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514892},
  doi          = {10.1080/19393555.2010.514892},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Atyam10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Beghdad10,
  author       = {Rachid Beghdad},
  title        = {Critical Study of Supervised Learning Techniques in Predicting Attacks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {1},
  pages        = {22--35},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903551231},
  doi          = {10.1080/19393550903551231},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Beghdad10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Chasser10,
  author       = {John Mark Chasser},
  title        = {Security Concerns in IPv6 and Transition Networks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {5},
  pages        = {282--293},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514653},
  doi          = {10.1080/19393555.2010.514653},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Chasser10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Edge10,
  author       = {Irene E. Edge},
  title        = {Employ Five Fundamental Principles to Produce a SOLID, Secure Network},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {3},
  pages        = {153--159},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003649008},
  doi          = {10.1080/19393551003649008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Edge10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Farrell10,
  author       = {Rhonda Farrell},
  title        = {Securing the Cloud - Governance, Risk, and Compliance Issues Reign
                  Supreme},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {6},
  pages        = {310--319},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514655},
  doi          = {10.1080/19393555.2010.514655},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Farrell10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Fournaris10,
  author       = {Apostolos P. Fournaris},
  title        = {Trust Ensuring Crisis Management Hardware Module},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {74--83},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903404910},
  doi          = {10.1080/19393550903404910},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Fournaris10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Gikas10,
  author       = {Constantine Gikas},
  title        = {A General Comparison of FISMA, HIPAA, {ISO} 27000 and {PCI-DSS} Standards},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {3},
  pages        = {132--141},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003657019},
  doi          = {10.1080/19393551003657019},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Gikas10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GogolinJ10,
  author       = {Greg Gogolin and
                  James Jones},
  title        = {Law Enforcement's Ability to Deal with Digital Crime and the Implications
                  for Business},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {3},
  pages        = {109--117},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.483931},
  doi          = {10.1080/19393555.2010.483931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GogolinJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GuptaA10,
  author       = {Ankur Gupta and
                  Lalit Kumar Awasthi},
  title        = {A Containment-Based Security Model for Cycle-Stealing {P2P} Applications},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {4},
  pages        = {191--203},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003762207},
  doi          = {10.1080/19393551003762207},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/GuptaA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GuptaGGGGS10,
  author       = {Anand Gupta and
                  Shyam K. Gupta and
                  Isha Manu Ganesh and
                  Pankhuri Gupta and
                  Vikram Goyal and
                  Sangeeta Sabharwal},
  title        = {Opaqueness Characteristic of a Context Honeypot System},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {3},
  pages        = {142--152},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903532561},
  doi          = {10.1080/19393550903532561},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/GuptaGGGGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Hanny10,
  author       = {Jonathan Hanny},
  title        = {Building an Application Security Program},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {6},
  pages        = {336--342},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514891},
  doi          = {10.1080/19393555.2010.514891},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Hanny10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/JulischH10,
  author       = {Klaus Julisch and
                  Michael Hall},
  title        = {Security and Control in the Cloud},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {6},
  pages        = {299--309},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514654},
  doi          = {10.1080/19393555.2010.514654},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/JulischH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Kadam10,
  author       = {Avinash W. Kadam},
  title        = {Personal Business Continuity Planning},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {1},
  pages        = {4--10},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903577657},
  doi          = {10.1080/19393550903577657},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Kadam10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KumarM10,
  author       = {Vinay Kumar and
                  Sunil Kumar Muttoo},
  title        = {Graph Theoretic Approach to Steganography to Secure Message Digest},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {6},
  pages        = {328--335},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514890},
  doi          = {10.1080/19393555.2010.514890},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/KumarM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Li10,
  author       = {Xi Li},
  title        = {How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations
                  for Every Language in {NP}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {3},
  pages        = {160--174},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.483930},
  doi          = {10.1080/19393555.2010.483930},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Li10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ManesD10,
  author       = {Gavin Wylie Manes and
                  Elizabeth Downing},
  title        = {What Security Professionals Need to Know About Digital Evidence},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {3},
  pages        = {124--131},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903200466},
  doi          = {10.1080/19393550903200466},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ManesD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Marie10,
  author       = {Michael Ste. Marie},
  title        = {Do You Have a Disaster Recovery Plan?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {1},
  pages        = {1--3},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903317088},
  doi          = {10.1080/19393550903317088},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Marie10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Matthews10,
  author       = {David R. Matthews},
  title        = {eDiscovery versus Computer Forensics},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {3},
  pages        = {118--123},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903074135},
  doi          = {10.1080/19393550903074135},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Matthews10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MishraC10,
  author       = {Durgesh Kumar Mishra and
                  Manohar Chandwani},
  title        = {A Secured MultiParty Computational Protocol to Protect Cyber Space},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {4},
  pages        = {175--181},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903532553},
  doi          = {10.1080/19393550903532553},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MishraC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Mocanu10,
  author       = {Virgil Mocanu},
  title        = {Requirements for Security Enhancements to Legacy Software with {RUP}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {4},
  pages        = {226--236},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.483929},
  doi          = {10.1080/19393555.2010.483929},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Mocanu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Orakwue10,
  author       = {Enuma Orakwue},
  title        = {Private Clouds: Secure Managed Services},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {6},
  pages        = {295--298},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903482924},
  doi          = {10.1080/19393550903482924},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Orakwue10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PengZ10,
  author       = {Jin Peng and
                  Xin Zhao},
  title        = {SSH-Based Device Identity and Trust Initialization},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {5},
  pages        = {237--242},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.493598},
  doi          = {10.1080/19393555.2010.493598},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/PengZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Poore10,
  author       = {Ralph Spencer Poore},
  title        = {Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {51--52},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003796015},
  doi          = {10.1080/19393551003796015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Poore10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Price10,
  author       = {Sean Price},
  title        = {A Heuristic Search for Identifying Required Application Libraries
                  Supporting a Run-Time Security Policy},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {100--108},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903375953},
  doi          = {10.1080/19393550903375953},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Price10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RodaL10,
  author       = {Fernando Roda and
                  Luis Lara},
  title        = {Chaotic Cipher Using the Duffing Equation},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {6},
  pages        = {320--327},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514889},
  doi          = {10.1080/19393555.2010.514889},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/RodaL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sanders10,
  author       = {Aaron D. Sanders},
  title        = {Conficker: Lessons in Secure Software and System Design},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {95--99},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903550407},
  doi          = {10.1080/19393550903550407},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sanders10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SathyanarayanaKB10,
  author       = {S. V. Sathyanarayana and
                  M. Aswatha Kumar and
                  K. N. Hari Bhat},
  title        = {Random Binary and Non-Binary Sequences Derived from Random Sequence
                  of Points on Cyclic Elliptic Curve Over Finite Field \emph{GF}(2\({}^{\mbox{\emph{m}}}\))
                  and Their Properties},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {84--94},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903482759},
  doi          = {10.1080/19393550903482759},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SathyanarayanaKB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SindhuK10,
  author       = {Siva S. Sivatha Sindhu and
                  Arputharaj Kannan},
  title        = {Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means
                  Algorithm},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {4},
  pages        = {204--212},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003762215},
  doi          = {10.1080/19393551003762215},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SindhuK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SinghGD10,
  author       = {Jyotsna Singh and
                  Parul Garg and
                  Alok Nath De},
  title        = {Data Hiding in Audio Using Random Orthogonal Matrices},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {5},
  pages        = {273--281},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514652},
  doi          = {10.1080/19393555.2010.514652},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SinghGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos10,
  author       = {Nicolas Sklavos},
  title        = {On the Hardware Implementation Cost of Crypto-Processors Architectures},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {53--60},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003649016},
  doi          = {10.1080/19393551003649016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Tammineedi10,
  author       = {Rama Lingeswara Tammineedi},
  title        = {Business Continuity Management: {A} Standards-Based Approach},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {1},
  pages        = {36--50},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903551843},
  doi          = {10.1080/19393550903551843},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Tammineedi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TawalbehS10,
  author       = {Lo'ai Ali Tawalbeh and
                  Saadeh Sweidan},
  title        = {Hardware Design and Implementation of \emph{ElGamal} Public-Key Cryptography
                  Algorithm},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {5},
  pages        = {243--252},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.499799},
  doi          = {10.1080/19393555.2010.499799},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/TawalbehS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TingC10,
  author       = {Wendy W. Ting and
                  David R. Comings},
  title        = {Information Assurance Metric for Assessing NIST's Monitoring Step
                  in the Risk Management Framework},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {5},
  pages        = {253--262},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393555.2010.514650},
  doi          = {10.1080/19393555.2010.514650},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/TingC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/VijayaraghavanPN10,
  author       = {V. Vijayaraghavan and
                  Sanjoy Kumar Paul and
                  Rajarathnam Nallusamy},
  title        = {iMeasure Security (iMS): {A} Framework for Quantitative Assessment
                  of Security Measures and its Impacts},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {4},
  pages        = {213--225},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003762223},
  doi          = {10.1080/19393551003762223},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/VijayaraghavanPN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/WangGC10,
  author       = {Ju An Wang and
                  Michael M. Guo and
                  Jairo Camargo},
  title        = {An Ontological Approach to Computer System Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {61--73},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903404902},
  doi          = {10.1080/19393550903404902},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/WangGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/YangCJ10,
  author       = {Seung S. Yang and
                  Hongsik Choi and
                  Hankyu Joo},
  title        = {Vulnerability Analysis of the Grid Data Security Authentication System},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {4},
  pages        = {182--190},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393551003762199},
  doi          = {10.1080/19393551003762199},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/YangCJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics