Search dblp for Publications

export results for "toc:db/journals/compsec/compsec16.bht:"

 download as .bib file

@article{DBLP:journals/compsec/Bouniol97,
  author       = {Stephane G. Bouniol},
  title        = {The puzzle theorem - The less {I} know, the less {I} can disclose
                  ..},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {115--125},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)88290-9},
  doi          = {10.1016/S0167-4048(97)88290-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bouniol97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Boyce97,
  author       = {Brian Boyce},
  title        = {Cyber extortion - The corporate response},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {25--28},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)85784-7},
  doi          = {10.1016/S0167-4048(97)85784-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Boyce97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BunnellPHNK97,
  author       = {Julie Bunnell and
                  John Podd and
                  Ron Henderson and
                  Renee Napier and
                  James Kennedy{-}Moffat},
  title        = {Cognitive, associative and conventional passwords: Recall and guessing
                  rates},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {629--641},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00008-4},
  doi          = {10.1016/S0167-4048(97)00008-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BunnellPHNK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ciechanowicz97,
  author       = {Zbigniew Ciechanowicz},
  title        = {Risk analysis: requirements, conflicts and problems},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {223--232},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00004-7},
  doi          = {10.1016/S0167-4048(97)00004-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ciechanowicz97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Clark97,
  author       = {Andrew J. Clark},
  title        = {Key recovery - why, how, who?},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {8},
  pages        = {669--674},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)87581-5},
  doi          = {10.1016/S0167-4048(97)87581-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Clark97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen97,
  author       = {Fred Cohen},
  title        = {Information system attacks: {A} preliminary classification scheme},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {29--46},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)85785-9},
  doi          = {10.1016/S0167-4048(97)85785-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen97a,
  author       = {Fred Cohen},
  title        = {Information system defences: {A} preliminary classification scheme},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {94--114},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)88289-2},
  doi          = {10.1016/S0167-4048(97)88289-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Finne97,
  author       = {Thomas Finne},
  title        = {What are the information security risks in decision support systems
                  and data warehousing?},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {197--204},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)84512-9},
  doi          = {10.1016/S0167-4048(97)84512-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Finne97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Finne97a,
  author       = {Thomas Finne},
  title        = {Information security implemented in: The theory on stock market efficiency,
                  Markowitz's portfolio theory and porter's value chain},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {469--479},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)84641-X},
  doi          = {10.1016/S0167-4048(97)84641-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Finne97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Foley97,
  author       = {Simon N. Foley},
  title        = {Building Chinese walls in standard unix\({}^{\mbox{TM}}\)},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {551--563},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00010-2},
  doi          = {10.1016/S0167-4048(97)00010-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Foley97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GennaroKMPRSWZ97,
  author       = {Rosario Gennaro and
                  Paul A. Karger and
                  Stephen M. Matyas and
                  Mohammad Peyravian and
                  Allen Roginsky and
                  David Safford and
                  Michael Willett and
                  Nevenko Zunic},
  title        = {Two-phase cryptographic key recovery system},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {481--506},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)84642-1},
  doi          = {10.1016/S0167-4048(97)84642-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GennaroKMPRSWZ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Gritzalis97,
  author       = {Dimitris Gritzalis},
  title        = {A baseline security policy for distributed healthcare information
                  systems},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {8},
  pages        = {709--719},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00009-6},
  doi          = {10.1016/S0167-4048(97)00009-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Gritzalis97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hickson97,
  author       = {Nigel Hickson},
  title        = {Encryption policy - {A} {UK} perspective},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {583--589},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80794-8},
  doi          = {10.1016/S0167-4048(97)80794-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hickson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {4--13},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)85782-3},
  doi          = {10.1016/S0167-4048(97)85782-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97a,
  author       = {Harold Joseph Highland},
  title        = {Current literature The 19th National Information Systems Security
                  Conference},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {47--59},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)85786-0},
  doi          = {10.1016/S0167-4048(97)85786-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97b,
  author       = {Harold Joseph Highland},
  title        = {IFIP/SEC'97 conference proceedings},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {205},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)84513-0},
  doi          = {10.1016/S0167-4048(97)84513-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97c,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {266--275},
  year         = {1997},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97d,
  author       = {Harold Joseph Highland},
  title        = {The threats on the web},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {365--368},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82242-0},
  doi          = {10.1016/S0167-4048(97)82242-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97e,
  author       = {Harold Joseph Highland},
  title        = {Data encryption: {A} non-mathematical approach},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {369--386},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82243-2},
  doi          = {10.1016/S0167-4048(97)82243-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97f,
  author       = {Harold Joseph Highland},
  title        = {Historical bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {387--411},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82244-4},
  doi          = {10.1016/S0167-4048(97)82244-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97g,
  author       = {Harold Joseph Highland},
  title        = {A history of computer viruses - Introduction},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {412--415},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82245-6},
  doi          = {10.1016/S0167-4048(97)82245-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97h,
  author       = {Harold Joseph Highland},
  title        = {A history of computer viruses - The famous 'trio'},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {416--429},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82246-8},
  doi          = {10.1016/S0167-4048(97)82246-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97i,
  author       = {Harold Joseph Highland},
  title        = {A history of computer viruses: Three special viruses},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {430--438},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82247-X},
  doi          = {10.1016/S0167-4048(97)82247-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland97j,
  author       = {Harold Joseph Highland},
  title        = {Procedures to reduce the computer virus threat},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {439--449},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82248-1},
  doi          = {10.1016/S0167-4048(97)82248-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland97j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HinkeDW97,
  author       = {Thomas H. Hinke and
                  Harry S. Delugach and
                  Randall P. Wolf},
  title        = {Protecting databases from inference attacks},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {8},
  pages        = {687--708},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)87607-9},
  doi          = {10.1016/S0167-4048(97)87607-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HinkeDW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Jones97,
  author       = {Andy Jones},
  title        = {Penetration testing and system audit - experience gained during the
                  investigation of systems within the {UK}},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {595--602},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80796-1},
  doi          = {10.1016/S0167-4048(97)80796-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Jones97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kemp97,
  author       = {Alasdair Kemp},
  title        = {Embedded systems: The other problem},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {8},
  pages        = {663--668},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)87580-3},
  doi          = {10.1016/S0167-4048(97)87580-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kemp97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich97,
  author       = {Gerald L. Kovacich},
  title        = {Information warfare and the information systems security professional},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {14--24},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)85783-5},
  doi          = {10.1016/S0167-4048(97)85783-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich97a,
  author       = {Gerald L. Kovacich},
  title        = {The {ISSO} must understand the business and management environment},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {321--326},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80196-4},
  doi          = {10.1016/S0167-4048(97)80196-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich97b,
  author       = {Gerald L. Kovacich},
  title        = {{ISSO} career development},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {455--458},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)84640-8},
  doi          = {10.1016/S0167-4048(97)84640-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich97c,
  author       = {Gerald L. Kovacich},
  title        = {Information systems security metrics management},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {610--618},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80798-5},
  doi          = {10.1016/S0167-4048(97)80798-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich97d,
  author       = {Gerald L. Kovacich},
  title        = {How to market yourself as an {ISSO}},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {8},
  pages        = {657--662},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)87579-7},
  doi          = {10.1016/S0167-4048(97)87579-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich97d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KrsulS97,
  author       = {Ivan Krsul and
                  Eugene H. Spafford},
  title        = {Authorship analysis: identifying the author of a program},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {233--257},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00005-9},
  doi          = {10.1016/S0167-4048(97)00005-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KrsulS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LabuschagneE97,
  author       = {Les Labuschagne and
                  Jan H. P. Eloff},
  title        = {Improved system-access control using complementary technologies},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {543--549},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00007-2},
  doi          = {10.1016/S0167-4048(97)00007-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LabuschagneE97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Meyer97,
  author       = {John Meyer},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {2--3},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)90001-8},
  doi          = {10.1016/S0167-4048(97)90001-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Meyer97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Meyer97a,
  author       = {John Meyer},
  title        = {Professor Harold Joseph Highland FICS, {FACM}},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {350--355},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82240-7},
  doi          = {10.1016/S0167-4048(97)82240-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Meyer97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Molini97,
  author       = {James E. Molini},
  title        = {Electronic borders: Defining and protecting national networks},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {189--196},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)84511-7},
  doi          = {10.1016/S0167-4048(97)84511-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Molini97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mulhall97,
  author       = {Tom Mulhall},
  title        = {Where have all the hackers gone? {A} study in motivation, deterrence,
                  and crime displacement: Part 1 - introduction {\&} methodology},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {277--284},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80190-3},
  doi          = {10.1016/S0167-4048(97)80190-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Mulhall97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mulhall97a,
  author       = {Tom Mulhall},
  title        = {Where have all the hackers gone?: Part 2 - Frequency of computer related
                  abuse: the surveys, and public perception of the problem},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {285--290},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80191-5},
  doi          = {10.1016/S0167-4048(97)80191-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Mulhall97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mulhall97b,
  author       = {Tom Mulhall},
  title        = {Where have all the hackers gone?: Part 3 - Motivation and deterrence},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {291--297},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80192-7},
  doi          = {10.1016/S0167-4048(97)80192-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Mulhall97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mulhall97c,
  author       = {Tom Mulhall},
  title        = {Where have all the hackers gone?: Part 4 - Legislation},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {298--303},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80193-9},
  doi          = {10.1016/S0167-4048(97)80193-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Mulhall97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mulhall97d,
  author       = {Tom Mulhall},
  title        = {Where have all the hackers gone?: Part 5 - Conclusions},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {304--306},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80194-0},
  doi          = {10.1016/S0167-4048(97)80194-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Mulhall97d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mulhall97e,
  author       = {Tom Mulhall},
  title        = {Where have all the hackers gone?: Part 6 - Appendices and bibliography},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {307--315},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)90153-X},
  doi          = {10.1016/S0167-4048(97)90153-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Mulhall97e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Parker97,
  author       = {Donn B. Parker},
  title        = {The strategic values of information security in business},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {572--582},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80793-6},
  doi          = {10.1016/S0167-4048(97)80793-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Parker97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pounder97,
  author       = {Chris Pounder},
  title        = {First steps towards a european union policy on the securing of electronic
                  communications},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {590--594},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80795-X},
  doi          = {10.1016/S0167-4048(97)80795-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pounder97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ratnasingham97,
  author       = {Pauline Ratnasingham},
  title        = {{EDI} security - re-evaluation of controls and its implications on
                  the organizations},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {8},
  pages        = {650--656},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)87578-5},
  doi          = {10.1016/S0167-4048(97)87578-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ratnasingham97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Sherwood97,
  author       = {John Sherwood},
  title        = {Managing security for outsourcing contracts},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {603--609},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80797-3},
  doi          = {10.1016/S0167-4048(97)80797-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Sherwood97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SohD97,
  author       = {Ben Soh and
                  Tharam S. Dillon},
  title        = {System intrusion processes: a simulation model},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {71--79},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00001-1},
  doi          = {10.1016/S0167-4048(97)00001-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SohD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TetteroOFS97,
  author       = {O. Tettero and
                  D. J. Out and
                  Henry M. Franken and
                  J. Schot},
  title        = {Information security embedded in the design of telematics systems},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {145--164},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00003-5},
  doi          = {10.1016/S0167-4048(97)00003-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TetteroOFS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VolpanoI97,
  author       = {Dennis M. Volpano and
                  Cynthia E. Irvine},
  title        = {Secure flow typing},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {137--144},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00002-3},
  doi          = {10.1016/S0167-4048(97)00002-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VolpanoI97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangH97,
  author       = {Chih{-}Hung Wang and
                  Tzonelih Hwang},
  title        = {Modified Chen-Hwang identity-based conference key broadcast schemes
                  with user authentication},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {339--344},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)00006-0},
  doi          = {10.1016/S0167-4048(97)00006-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood97,
  author       = {Charles Cresson Wood},
  title        = {A management view of internet electronic commerce security},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {316--320},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80195-2},
  doi          = {10.1016/S0167-4048(97)80195-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X97,
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {356--364},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)82241-9},
  doi          = {10.1016/S0167-4048(97)82241-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/X97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X97a,
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {452--453},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)84639-1},
  doi          = {10.1016/S0167-4048(97)84639-1},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X97b,
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {7},
  pages        = {570--571},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)80792-4},
  doi          = {10.1016/S0167-4048(97)80792-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X97c,
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {16},
  number       = {8},
  pages        = {648--649},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-4048(97)87577-3},
  doi          = {10.1016/S0167-4048(97)87577-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics