Foundations for a new theory of plausible and paradoxical reasoning J Dezert Information and Security 9, 13-57, 2002 | 358 | 2002 |
Credit card fraud detection using self-organizing maps V Zaslavsky, A Strizhak Information and Security 18, 48, 2006 | 156 | 2006 |
TerroristUse'of the Internet and Fighting Back M Conway Information and security 19, 9, 2006 | 134 | 2006 |
Challenges in e-government and security of information MS Hwang, CT Li, JJ Shen, YP Chu Information & Security 15 (1), 9-20, 2004 | 116 | 2004 |
I&S THE CYBERWAR DEBATE: PERCEPTION AND POLITICS IN US CRITICAL INFRASTRUCTURE PROTECTION R Bendrath Special Issue of Information & Security 65, 2001 | 116 | 2001 |
CROCADILE - An Open, Extensible Agent-Based Distillation Engine M Barlow, A Easton Information & Security: An International Journal 8 (1), 17-51, 2002 | 61 | 2002 |
Supply chain cyber security–potential threats L Urciuoli, T Männistö, J Hintsa, T Khan Information & Security: An International Journal 29 (1), 2013 | 59 | 2013 |
Critical information infrastructure protection: analysis, evaluation and expectations E Nickolov Information and Security 17, 105, 2006 | 59 | 2006 |
Cyber security teaching and learning laboratories: A survey L Topham, K Kifayat, YA Younis, Q Shi, B Askwith Information & Security 35 (1), 51, 2016 | 57 | 2016 |
A BTC-Based Watermarking Scheme for Digital Images SF Tu, CS Hsu Information & Security: An International Journal 15 (2), 216-228, 2004 | 46 | 2004 |
The Case for Advanced Distributed Learning RA Wisher, D Fletcher Information & Security: An International Journal 14, 17-25, 2004 | 42 | 2004 |
HLA and Beyond: Interoperability Challenges J Dahmann, M Salisbury, P Barry, C Turrell, P Blemberg Information & Security: An International Journal 3, 25-42, 1999 | 42 | 1999 |
Specific Features of IMM Tracking Filter Design I Simeonova, T Semerdjiev Information & Security: An International Journal 9, 154-165, 2002 | 39 | 2002 |
The Internet and the Changing Face of International Relations and Security Editorial Information & Security: An International Journal 7, 5-11, 2000 | 38* | 2000 |
Virtual diplomacy: rethinking foreign policy practice in the information age SJ Brown, MS Studemeister Special Issue of Information & Security, 23, 2001 | 36 | 2001 |
Money Laundering Techniques with Electronic Payment Systems K Woda Information & Security: An International Journal 18, 27-47, 2006 | 33* | 2006 |
Capabilities-based planning for security sector transformation T Tagarev Information & Security: An International Journal 24, 2009 | 32 | 2009 |
Human Expert Fusion for Image Classification A Martin, C Osswald Information & Security: An International Journal 20, 122-143, 2006 | 31 | 2006 |
A License Plate Recognition System in e-Government HC Wu, CS Tsai, CH Lai Information & Security: An International Journal 15 (2), 199-210, 2004 | 31 | 2004 |
Bulgaria and NATO: 7 Lost Years J Simon Information & Security: An International Journal 1 (2), 93-104, 1998 | 31 | 1998 |