| 2007 |
| 67 | EE | E. Eugene Schultz:
What infosec changes are likely to result from the recent US election?
Computers & Security 26(1): 1-2 (2007) |
| 66 | EE | E. Eugene Schultz:
Windows Vista: Microsoft's brave new world.
Computers & Security 26(2): 99 (2007) |
| 65 | EE | E. Eugene Schultz:
Mobile computing: The next Pandora's Box.
Computers & Security 26(3): 187 (2007) |
| 64 | EE | E. Eugene Schultz:
Struggles in the academic side of infosec.
Computers & Security 26(4): 267-268 (2007) |
| 63 | EE | Kim-Phuong L. Vu,
Robert W. Proctor,
Abhilasha Bhargav-Spantzel,
Bik-Lam (Belin) Tai,
Joshua Cook,
E. Eugene Schultz:
Improving password security and memorability to protect personal and organizational information.
International Journal of Man-Machine Studies 65(8): 744-757 (2007) |
| 2006 |
| 62 | EE | E. Eugene Schultz:
Dilemmas and boundaries of digital rights management.
Computers & Security 25(1): 1-2 (2006) |
| 61 | EE | E. Eugene Schultz:
About "Unofficial patches".
Computers & Security 25(2): 79-80 (2006) |
| 60 | EE | E. Eugene Schultz:
Special systems: Overlooked sources of security risk?
Computers & Security 25(3): 155 (2006) |
| 59 | EE | E. Eugene Schultz:
Representing information security fairly and accurately.
Computers & Security 25(4): 237 (2006) |
| 58 | EE | E. Eugene Schultz:
The changing winds of information security.
Computers & Security 25(5): 315-316 (2006) |
| 57 | EE | E. Eugene Schultz:
Microsoft is back in the hot seat.
Computers & Security 25(6): 393-394 (2006) |
| 56 | EE | E. Eugene Schultz:
Issues concerning the distribution of vulnerability information.
Computers & Security 25(7): 475-476 (2006) |
| 55 | EE | E. Eugene Schultz:
Predicting the future of InfoSec.
Computers & Security 25(8): 553-554 (2006) |
| 2005 |
| 54 | EE | E. Eugene Schultz:
Search engines: a growing contributor to security risk.
Computers & Security 24(2): 87-88 (2005) |
| 53 | EE | E. Eugene Schultz:
Lycos crosses the line.
Computers & Security 24(2): 89-90 (2005) |
| 52 | EE | E. Eugene Schultz:
Security dilemmas with Microsoft's Internet Explorer.
Computers & Security 24(3): 175-176 (2005) |
| 51 | EE | E. Eugene Schultz:
Personal information compromises: It is time for the U.S. Government to wake up.
Computers & Security 24(4): 261-262 (2005) |
| 50 | EE | E. Eugene Schultz:
Non-infosec professionals in infosec?
Computers & Security 24(5): 347-348 (2005) |
| 49 | | E. Eugene Schultz:
Security views.
Computers & Security 24(5): 349-358 (2005) |
| 48 | EE | E. Eugene Schultz:
The human factor in security.
Computers & Security 24(6): 425-426 (2005) |
| 47 | | E. Eugene Schultz:
Security views.
Computers & Security 24(6): 427-436 (2005) |
| 46 | EE | E. Eugene Schultz:
Aligning disaster recovery and security incident response.
Computers & Security 24(7): 505-506 (2005) |
| 45 | EE | E. Eugene Schultz:
Infosec certification: Which way do we turn from here?
Computers & Security 24(8): 587-588 (2005) |
| 44 | | E. Eugene Schultz:
Security views.
Computers & Security 24(8): 589-598 (2005) |
| 2004 |
| 43 | EE | E. Eugene Schultz:
Security training and awareness - fitting a square peg in a round hole.
Computers & Security 23(1): 1-2 (2004) |
| 42 | EE | E. Eugene Schultz:
Incident response teams need to change.
Computers & Security 23(2): 87-88 (2004) |
| 41 | EE | E. Eugene Schultz:
Worms and viruses: are we losing control?
Computers & Security 23(3): 179-180 (2004) |
| 40 | EE | E. Eugene Schultz:
Security views.
Computers & Security 23(3): 181-190 (2004) |
| 39 | EE | E. Eugene Schultz:
Intrusion prevention.
Computers & Security 23(4): 265-266 (2004) |
| 38 | EE | E. Eugene Schultz:
Security views.
Computers & Security 23(4): 267-274 (2004) |
| 37 | EE | E. Eugene Schultz:
Sarbanes-Oxley - a huge boon to information security in the US.
Computers & Security 23(5): 353-354 (2004) |
| 36 | EE | E. Eugene Schultz:
Security views.
Computers & Security 23(5): 355-361 (2004) |
| 35 | EE | E. Eugene Schultz:
The case for one-time credentials.
Computers & Security 23(6): 441-442 (2004) |
| 34 | EE | E. Eugene Schultz:
The gap between cryptography and information security: has it narrowed?
Computers & Security 23(7): 531-532 (2004) |
| 33 | | E. Eugene Schultz:
Security views.
Computers & Security 23(7): 533-541 (2004) |
| 32 | EE | E. Eugene Schultz:
Is the U.S. government really getting serious about information security?
Computers & Security 23(8): 621-622 (2004) |
| 2003 |
| 31 | | E. Eugene Schultz:
Security views.
Computers & Security 22(1): 4-13 (2003) |
| 30 | | Jesper M. Johansson,
E. Eugene Schultz:
Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions.
Computers & Security 22(2): 152-159 (2003) |
| 29 | | E. Eugene Schultz:
Internet security: what's in the future?
Computers & Security 22(2): 78-79 (2003) |
| 28 | | E. Eugene Schultz:
Security Views.
Computers & Security 22(2): 80-89 (2003) |
| 27 | EE | E. Eugene Schultz:
Security views.
Computers & Security 22(3): 176-187 (2003) |
| 26 | EE | Seny Kamara,
Sonia Fahmy,
E. Eugene Schultz,
Florian Kerschbaum,
Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls.
Computers & Security 22(3): 214-232 (2003) |
| 25 | EE | E. Eugene Schultz:
Why can't Microsoft stay out of the InfoSec headlines?
Computers & Security 22(4): 270-272 (2003) |
| 24 | EE | E. Eugene Schultz:
Attackers hit Web hosting servers.
Computers & Security 22(4): 273-283 (2003) |
| 23 | EE | E. Eugene Schultz:
Pandora's Box: spyware, adware, autoexecution, and NGSCB.
Computers & Security 22(5): 366-367 (2003) |
| 22 | EE | E. Eugene Schultz:
Security Views.
Computers & Security 22(5): 368-377 (2003) |
| 21 | EE | E. Eugene Schultz:
Security views: Online piracy battle heats up in US.
Computers & Security 22(6): 464-473 (2003) |
| 20 | EE | E. Eugene Schultz:
Patching Pandemonium.
Computers & Security 22(7): 556-558 (2003) |
| 19 | EE | E. Eugene Schultz:
Information security and the media.
Computers & Security 22(8): 652-653 (2003) |
| 18 | EE | E. Eugene Schultz:
Security views.
Computers & Security 22(8): 654-663 (2003) |
| 2002 |
| 17 | | E. Eugene Schultz:
Security Views.
Computers & Security 21(1): 5-15 (2002) |
| 16 | | E. Eugene Schultz:
Security Views.
Computers & Security 21(2): 101-112 (2002) |
| 15 | | E. Eugene Schultz:
Security Views.
Computers & Security 21(3): 201-211 (2002) |
| 14 | | E. Eugene Schultz:
The Sorry State of Law Enforcement.
Computers & Security 21(4): 290-292 (2002) |
| 13 | | E. Eugene Schultz:
Security views.
Computers & Security 21(4): 293-302 (2002) |
| 12 | | E. Eugene Schultz:
Taking a stand on hackers.
Computers & Security 21(5): 382-384 (2002) |
| 11 | | E. Eugene Schultz:
Security Views.
Computers & Security 21(5): 385-396 (2002) |
| 10 | | E. Eugene Schultz:
Security Views.
Computers & Security 21(6): 481-490 (2002) |
| 9 | | E. Eugene Schultz:
A framework for understanding and predicting insider attacks.
Computers & Security 21(6): 526-531 (2002) |
| 8 | | E. Eugene Schultz:
The US Government bigger and better information security?
Computers & Security 21(7): 578-580 (2002) |
| 7 | | E. Eugene Schultz:
Security Views.
Computers & Security 21(7): 581-590 (2002) |
| 6 | | E. Eugene Schultz:
The gap between cryptography and information security.
Computers & Security 21(8): 674-67 (2002) |
| 5 | | E. Eugene Schultz:
Security Views.
Computers & Security 21(8): 677-688 (2002) |
| 2001 |
| 4 | | Michael Frantzen,
Florian Kerschbaum,
E. Eugene Schultz,
Sonia Fahmy:
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals.
Computers & Security 20(3): 263-270 (2001) |
| 3 | | E. Eugene Schultz,
Robert W. Proctor,
Mei-Ching Lien,
Gavriel Salvendy:
Usability and Security An Appraisal of Usability Issues in Information Security Methods.
Computers & Security 20(7): 620-634 (2001) |
| 1999 |
| 2 | EE | E. Eugene Schultz:
Windows NT security: Kudos, concerns, and prescriptions.
Computers & Security 18(3): 204-210 (1999) |
| 1993 |
| 1 | EE | Thomas A. Longstaff,
E. Eugene Schultz:
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code.
Computers & Security 12(1): 61-77 (1993) |