Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Stephen Hinde
@article{DBLP:journals/compsec/Hinde03, author = {Stephen Hinde}, title = {Time cost{\textdollar} money}, journal = {Comput. Secur.}, volume = {22}, number = {1}, pages = {14--21}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00103-2}, doi = {10.1016/S0167-4048(03)00103-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde03a, author = {Stephen Hinde}, title = {The law, cybercrime, risk assessment and cyber protection}, journal = {Comput. Secur.}, volume = {22}, number = {2}, pages = {90--95}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00203-7}, doi = {10.1016/S0167-4048(03)00203-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde03b, author = {Stephen Hinde}, title = {Cyber-terrorism in context}, journal = {Comput. Secur.}, volume = {22}, number = {3}, pages = {188--192}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00303-1}, doi = {10.1016/S0167-4048(03)00303-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde03c, author = {Stephen Hinde}, title = {Careless about privacy}, journal = {Comput. Secur.}, volume = {22}, number = {4}, pages = {284--288}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00403-6}, doi = {10.1016/S0167-4048(03)00403-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde03d, author = {Stephen Hinde}, title = {Privacy legislation: a comparison of the {US} and European approaches}, journal = {Comput. Secur.}, volume = {22}, number = {5}, pages = {378--387}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00503-0}, doi = {10.1016/S0167-4048(03)00503-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde03e, author = {Stephen Hinde}, title = {Spam: the evolution of a nuisance}, journal = {Comput. Secur.}, volume = {22}, number = {6}, pages = {474--478}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00603-5}, doi = {10.1016/S0167-4048(03)00603-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde03f, author = {Stephen Hinde}, title = {Nimbyism, dominoes and creaking infrastructure}, journal = {Comput. Secur.}, volume = {22}, number = {7}, pages = {570--576}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00703-X}, doi = {10.1016/S0167-4048(03)00703-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde03g, author = {Stephen Hinde}, title = {Computer security: Mapping the future}, journal = {Comput. Secur.}, volume = {22}, number = {8}, pages = {664--669}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00003-8}, doi = {10.1016/S0167-4048(03)00003-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde03g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde02, author = {Stephen Hinde}, title = {2001: {A} Privacy Odyssey Revisited}, journal = {Comput. Secur.}, volume = {21}, number = {1}, pages = {16--34}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)00103-7}, doi = {10.1016/S0167-4048(02)00103-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde02a, author = {Stephen Hinde}, title = {It Was D{\'{e}}j{\'{a}} vu all Over Again}, journal = {Comput. Secur.}, volume = {21}, number = {3}, pages = {212--21}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)00303-6}, doi = {10.1016/S0167-4048(02)00303-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde02b, author = {Stephen Hinde}, title = {Security surveys spring crop}, journal = {Comput. Secur.}, volume = {21}, number = {4}, pages = {310--321}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)00404-2}, doi = {10.1016/S0167-4048(02)00404-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde02c, author = {Stephen Hinde}, title = {The perils of privacy}, journal = {Comput. Secur.}, volume = {21}, number = {5}, pages = {424--432}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)00508-4}, doi = {10.1016/S0167-4048(02)00508-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde02d, author = {Stephen Hinde}, title = {The Blue Screen of Death and other deadly bugs}, journal = {Comput. Secur.}, volume = {21}, number = {6}, pages = {491--496}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)01003-9}, doi = {10.1016/S0167-4048(02)01003-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde02d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde02e, author = {Stephen Hinde}, title = {Spam, scams, chains, hoaxes and other junk mail}, journal = {Comput. Secur.}, volume = {21}, number = {7}, pages = {592--606}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)01104-5}, doi = {10.1016/S0167-4048(02)01104-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde02e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde02f, author = {Stephen Hinde}, title = {Compsec 2002: the complete security circle}, journal = {Comput. Secur.}, volume = {21}, number = {8}, pages = {689--693}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)00803-9}, doi = {10.1016/S0167-4048(02)00803-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde02f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01, author = {Stephen Hinde}, title = {2001: {A} Privacy Odyssey}, journal = {Comput. Secur.}, volume = {20}, number = {1}, pages = {21--27}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)01016-1}, doi = {10.1016/S0167-4048(01)01016-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01a, author = {Stephen Hinde}, title = {The Search For Privacy}, journal = {Comput. Secur.}, volume = {20}, number = {2}, pages = {127--131}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00203-6}, doi = {10.1016/S0167-4048(01)00203-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01b, author = {Stephen Hinde}, title = {The Times They Are A-Changin'}, journal = {Comput. Secur.}, volume = {20}, number = {3}, pages = {202--206}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00303-0}, doi = {10.1016/S0167-4048(01)00303-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01c, author = {Stephen Hinde}, title = {The Weakest Link}, journal = {Comput. Secur.}, volume = {20}, number = {4}, pages = {295--301}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00403-5}, doi = {10.1016/S0167-4048(01)00403-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01d, author = {Stephen Hinde}, title = {Cyberthreats: Perceptions, Reality and Protection}, journal = {Comput. Secur.}, volume = {20}, number = {5}, pages = {364--371}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00503-X}, doi = {10.1016/S0167-4048(01)00503-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01e, author = {Stephen Hinde}, title = {Omnia te adversum spectantia, nulla retorsum\({}^{\mbox{*}}\)}, journal = {Comput. Secur.}, volume = {20}, number = {6}, pages = {468--474}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00603-4}, doi = {10.1016/S0167-4048(01)00603-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01f, author = {Stephen Hinde}, title = {Lessons Learned}, journal = {Comput. Secur.}, volume = {20}, number = {7}, pages = {561--567}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00703-9}, doi = {10.1016/S0167-4048(01)00703-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01g, author = {Stephen Hinde}, title = {Incalculable potential for damage by cyber-terrorism}, journal = {Comput. Secur.}, volume = {20}, number = {7}, pages = {568--572}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00704-0}, doi = {10.1016/S0167-4048(01)00704-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde01h, author = {Stephen Hinde}, title = {If you can meet with triumph and disaster and treat those two impostors just the same...}, journal = {Comput. Secur.}, volume = {20}, number = {8}, pages = {657--666}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00803-3}, doi = {10.1016/S0167-4048(01)00803-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde01h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde00, author = {Stephen Hinde}, title = {New Millennium, Old Failures}, journal = {Comput. Secur.}, volume = {19}, number = {2}, pages = {119--127}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)87821-9}, doi = {10.1016/S0167-4048(00)87821-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde00a, author = {Stephen Hinde}, title = {Life Was Simple Then}, journal = {Comput. Secur.}, volume = {19}, number = {3}, pages = {222--229}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)88610-1}, doi = {10.1016/S0167-4048(00)88610-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde00b, author = {Stephen Hinde}, title = {Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web}, journal = {Comput. Secur.}, volume = {19}, number = {4}, pages = {312--320}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)04018-9}, doi = {10.1016/S0167-4048(00)04018-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde00c, author = {Stephen Hinde}, title = {Love Conquers All?}, journal = {Comput. Secur.}, volume = {19}, number = {5}, pages = {408--420}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)05027-6}, doi = {10.1016/S0167-4048(00)05027-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde00c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde00d, author = {Stephen Hinde}, title = {Fireworks, Beer and Old Halfpennies - The Risks of Assumption}, journal = {Comput. Secur.}, volume = {19}, number = {6}, pages = {499--504}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)06024-7}, doi = {10.1016/S0167-4048(00)06024-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde00d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde00e, author = {Stephen Hinde}, title = {Do You Know Your Organization's Achilles Heel?}, journal = {Comput. Secur.}, volume = {19}, number = {7}, pages = {585--590}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)07018-8}, doi = {10.1016/S0167-4048(00)07018-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde00e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde00f, author = {Stephen Hinde}, title = {New Names For Old - {A} Personal Surf Through Compsec 200}, journal = {Comput. Secur.}, volume = {19}, number = {8}, pages = {679--687}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)08016-0}, doi = {10.1016/S0167-4048(00)08016-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde00f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99, author = {Stephen Hinde}, title = {One down, one to go}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {19--22}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80004-2}, doi = {10.1016/S0167-4048(99)80004-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99a, author = {Stephen Hinde}, title = {Year 2000 update}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {113--119}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80029-7}, doi = {10.1016/S0167-4048(99)80029-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99b, author = {Stephen Hinde}, title = {Are you in control?}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {199--203}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80064-9}, doi = {10.1016/S0167-4048(99)80064-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99c, author = {Stephen Hinde}, title = {E for exponential growth}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {295--299}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80072-8}, doi = {10.1016/S0167-4048(99)80072-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99d, author = {Stephen Hinde}, title = {E-mail can seriously damage your health}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {396--406}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80085-6}, doi = {10.1016/S0167-4048(99)80085-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99e, author = {Stephen Hinde}, title = {The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {565--572}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82002-1}, doi = {10.1016/S0167-4048(99)82002-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99f, author = {Stephen Hinde}, title = {Step into a secure new world - Compsec '99 report}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {660--669}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80130-8}, doi = {10.1016/S0167-4048(99)80130-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98, author = {Stephen Hinde}, title = {Hot water, icebergs and other disasters}, journal = {Comput. Secur.}, volume = {17}, number = {1}, pages = {31--33}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(97)80247-7}, doi = {10.1016/S0167-4048(97)80247-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98a, author = {Stephen Hinde}, title = {Cyber Wars and other threats}, journal = {Comput. Secur.}, volume = {17}, number = {2}, pages = {115--118}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(97)81979-7}, doi = {10.1016/S0167-4048(97)81979-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98b, author = {Stephen Hinde}, title = {Recent security surveys}, journal = {Comput. Secur.}, volume = {17}, number = {3}, pages = {207--210}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(98)80311-8}, doi = {10.1016/S0167-4048(98)80311-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98c, author = {Stephen Hinde}, title = {Contingency planning for the millenium}, journal = {Comput. Secur.}, volume = {17}, number = {4}, pages = {299--302}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(98)80009-6}, doi = {10.1016/S0167-4048(98)80009-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98d, author = {Stephen Hinde}, title = {Solar radiation is bad for you}, journal = {Comput. Secur.}, volume = {17}, number = {5}, pages = {385--388}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(98)80004-7}, doi = {10.1016/S0167-4048(98)80004-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98e, author = {Stephen Hinde}, title = {Privacy and security - The drivers for growth of E-Commerce}, journal = {Comput. Secur.}, volume = {17}, number = {6}, pages = {475--478}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(98)80069-2}, doi = {10.1016/S0167-4048(98)80069-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98f, author = {Stephen Hinde}, title = {Corporate governance and disasters}, journal = {Comput. Secur.}, volume = {17}, number = {7}, pages = {583--585}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(99)80057-1}, doi = {10.1016/S0167-4048(99)80057-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde98g, author = {Stephen Hinde}, title = {Time, history and war: {A} personal voyage through Compsec '98}, journal = {Comput. Secur.}, volume = {17}, number = {8}, pages = {671--681}, year = {1998}, url = {https://doi.org/10.1016/S0167-4048(98)80098-9}, doi = {10.1016/S0167-4048(98)80098-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde98g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.