E. Eugene Schultz

According to our database1, E. Eugene Schultz authored at least 55 papers between 1986 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2011
Intrusion Detection Systems (IDSs): Implementation.
Proceedings of the Encyclopedia of Information Assurance, 2011

Security Information and Event Management (SIEM).
Proceedings of the Encyclopedia of Information Assurance, 2011

Malicious Code: Rootkits.
Proceedings of the Encyclopedia of Information Assurance, 2011

Firewalls: Internet Security.
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
Risks due to convergence of physical security systems and information technology environments.
Inf. Secur. Tech. Rep., 2007

Improving password security and memorability to protect personal and organizational information.
Int. J. Hum. Comput. Stud., 2007

Struggles in the academic side of infosec.
Comput. Secur., 2007

Mobile computing: The next Pandora's Box.
Comput. Secur., 2007

Windows Vista: Microsoft's brave new world.
Comput. Secur., 2007

What infosec changes are likely to result from the recent US election?
Comput. Secur., 2007

2006
Predicting the future of InfoSec.
Comput. Secur., 2006

Issues concerning the distribution of vulnerability information.
Comput. Secur., 2006

Microsoft is back in the hot seat.
Comput. Secur., 2006

The changing winds of information security.
Comput. Secur., 2006

Representing information security fairly and accurately.
Comput. Secur., 2006

Special systems: Overlooked sources of security risk?
Comput. Secur., 2006

About "Unofficial patches".
Comput. Secur., 2006

Dilemmas and boundaries of digital rights management.
Comput. Secur., 2006

2005
Infosec certification: Which way do we turn from here?
Comput. Secur., 2005

Aligning disaster recovery and security incident response.
Comput. Secur., 2005

Security views.
Comput. Secur., 2005

The human factor in security.
Comput. Secur., 2005

Non-infosec professionals in infosec?
Comput. Secur., 2005

Personal information compromises: It is time for the U.S. Government to wake up.
Comput. Secur., 2005

Security dilemmas with Microsoft's Internet Explorer.
Comput. Secur., 2005

Lycos crosses the line.
Comput. Secur., 2005

Search engines: a growing contributor to security risk.
Comput. Secur., 2005

2004
Is the U.S. government really getting serious about information security?
Comput. Secur., 2004

The gap between cryptography and information security: has it narrowed?
Comput. Secur., 2004

The case for one-time credentials.
Comput. Secur., 2004

Sarbanes-Oxley - a huge boon to information security in the US.
Comput. Secur., 2004

Intrusion prevention.
Comput. Secur., 2004

Worms and viruses: are we losing control?
Comput. Secur., 2004

Incident response teams need to change.
Comput. Secur., 2004

Security training and awareness - fitting a square peg in a round hole.
Comput. Secur., 2004

2003
Information security and the media.
Comput. Secur., 2003

Patching Pandemonium.
Comput. Secur., 2003

Security views: Online piracy battle heats up in US.
Comput. Secur., 2003

Pandora's Box: spyware, adware, autoexecution, and NGSCB.
Comput. Secur., 2003

Attackers hit Web hosting servers.
Comput. Secur., 2003

Why can't Microsoft stay out of the InfoSec headlines?
Comput. Secur., 2003

Internet security: what's in the future?
Comput. Secur., 2003

Analysis of vulnerabilities in Internet firewalls.
Comput. Secur., 2003

Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions.
Comput. Secur., 2003

2002
The gap between cryptography and information security.
Comput. Secur., 2002

The US Government bigger and better information security?
Comput. Secur., 2002

A framework for understanding and predicting insider attacks.
Comput. Secur., 2002

Taking a stand on hackers.
Comput. Secur., 2002

The Sorry State of Law Enforcement.
Comput. Secur., 2002

2001
Usability and Security An Appraisal of Usability Issues in Information Security Methods.
Comput. Secur., 2001

A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals.
Comput. Secur., 2001

1999
Windows NT security: Kudos, concerns, and prescriptions.
Comput. Secur., 1999

1993
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code.
Comput. Secur., 1993

1992
Hawaii international conference on system sciences.
ACM SIGCHI Bull., 1992

1986
Menu Structure and Ordering of Menu Selection: Independent or Interactive effects?
ACM SIGCHI Bull., 1986


  Loading...