Computer Security

Related Fields

Parent Topic:

Computer Science

Child Topic:

Digital forensics, Application security, Security engineering, Cryptovirology, Supply chain risk management, Information privacy, Kleptography, Computer forensics, Internet security, Information governance, Network security, Information security

Top Authors

Paper Recommendation
1974 Judgment Under Uncertainty: Heuristics and Biases

1968 A Formal Basis For The Heuristic Determination of Minimum Cost Paths

1970 Decision-Making in A Fuzzy Environment

1979 A Theory of Approximate Reasoning

1996 The Balanced Scorecard: Translating Strategy into Action

1987 A Comparison of Commercial and Military Computer Security Policies

1983 The Iron Cage Revisited: institutional Isomorphism and Collective Rationality in Organizational Fields


1987 Relevance Lost: The Rise and Fall of Management Accounting

1999 Design and Analysis of Modern Tracking Systems

1979 Privacy and Authentication: An introduction To Cryptography

1987 Sonar-based Real-world Mapping and Navigation

1989 Perceived Usefulness, Perceived Ease of Use, and User Acceptance of information Technology

1993 Estimation and Tracking : Principles, Techniques, and Software

1983 Negotiation As A Metaphor For Distributed Problem Solving

1980 Computer Security Threat Monitoring and Surveillance

1988 The interacting Multiple Model Algorithm For Systems With Markovian Switching Coefficients

2002 Computer Networking: A Top-Down Approach Featuring The internet

1990 A Network Security Monitor

1996 Classification and Detection of Computer intrusions