AAAAAA

   
Results: 1-8 |
Results: 8

Authors: Evans, MP Furnell, SM
Citation: Mp. Evans et Sm. Furnell, The Resource Locator Service: fixing a flaw in the web, COMPUT NET, 37(3-4), 2001, pp. 307-330

Authors: Ghita, BV Furnell, SM Lines, BM Le-Foll, D Ifeachor, EC
Citation: Bv. Ghita et al., Network quality of service monitoring for IP telephony, INTERNET R, 11(1), 2001, pp. 26-34

Authors: Evans, MP Furnell, SM
Citation: Mp. Evans et Sm. Furnell, Internet-based security incidents and the potential for false alarms, INTERNET R, 10(3), 2000, pp. 238-245

Authors: Furnell, SM Dowland, PS Illingworth, HM Reynolds, PL
Citation: Sm. Furnell et al., Authentication and supervision: A survey of user attitudes, COMPUT SEC, 19(6), 2000, pp. 529-539

Authors: Furnell, SM Karweni, T
Citation: Sm. Furnell et T. Karweni, Security implications of electronic commerce: a survey of consumers and businesses, INTERNET R, 9(5), 1999, pp. 372-382

Authors: Evans, MP Phippen, AD Mueller, G Furnell, SM Sanders, PW Reynolds, PL
Citation: Mp. Evans et al., Strategies for content migration on the World Wide Web, INTERNET R, 9(1), 1999, pp. 25-34

Authors: Dowland, PS Furnell, SM Illingworth, HM Reynolds, PL
Citation: Ps. Dowland et al., Computer crime and abuse: A survey of public attitudes and awareness, COMPUT SEC, 18(8), 1999, pp. 715-726

Authors: Furnell, SM Warren, MJ
Citation: Sm. Furnell et Mj. Warren, Computer hacking and cyber terrorism: The real threats in the new millennium?, COMPUT SEC, 18(1), 1999, pp. 28-34
Risultati: 1-8 |