| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2011 | — | ch. |
Encyclopedia of Information Assurance
|
| 2011 | — | ch. |
Encyclopedia of Information Assurance
|
| 2011 | — | ch. |
Encyclopedia of Information Assurance
|
| 2011 | — | ch. |
Encyclopedia of Information Assurance
|
| 2007 | J | jnl |
Int. J. Hum. Comput. Stud.
|
| 2007 | J | jnl |
Comput. Secur.
|
| 2007 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2007 | J | jnl |
Comput. Secur.
|
| 2007 | J | jnl |
Comput. Secur.
|
| 2007 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2001 | J | jnl |
Comput. Secur.
|
| 2001 | J | jnl |
Comput. Secur.
|
| 1999 | J | jnl |
Comput. Secur.
|
| 1993 | J | jnl |
Comput. Secur.
|
| 1992 | J | jnl |
ACM SIGCHI Bull.
|
| 1986 | J | jnl |
ACM SIGCHI Bull.
|