dblp.uni-trier.dewww.uni-trier.de

Moshe Zviran

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
17EEIdo Green, Tzvi Raz, Moshe Zviran: Analysis of active intrusion prevention data for predicting hostile activity in computer networks. Commun. ACM 50(4): 63-68 (2007)
16EEAviv Segev, Moshe Leshno, Moshe Zviran: Internet as a knowledge base for medical diagnostic assistance. Expert Syst. Appl. 33(1): 251-255 (2007)
15EEAviv Segev, Moshe Leshno, Moshe Zviran: Context recognition using internet as a knowledge base. J. Intell. Inf. Syst. 29(3): 305-327 (2007)
2006
14EEMoshe Zviran, Dov Te'eni, Yuval Gross: Does color in email make a difference? Commun. ACM 49(4): 94-99 (2006)
2005
13EEMoshe Zviran, Chanan Glezer: Website and organisational characteristics of Israeli firms. IJEB 3(5): 411-426 (2005)
2004
12 Chanan Glezer, Moshe Zviran: A Reconfiguration Algorithm for Distributed Computer Networks. ICEIS (1) 2004: 491-494
11 Moshe Zviran, Seev Neumann, Diego Hocksman: Privacy Concerns in Internet Applications. ICEIS (3) 2004: 592-595
2003
10EEMoshe Zviran, Niv Ahituv, Chanan Glezer: A conceptual model for increasing utilization of dependable computer networks. Data Knowl. Eng. 46(3): 247-269 (2003)
2002
9EEMoshe Zviran: Securing PC applications: the relay race approach. Commun. ACM 45(4): 219-227 (2002)
2000
8EEMoshe Zviran, Chanan Glezer: Towards Generating a Data Integrity Standard. Data Knowl. Eng. 32(3): 291-313 (2000)
1999
7EENiv Ahituv, Moshe Zviran, Chanan Glezer: Top Management Toolbox for Managing Corporate IT. Commun. ACM 42(4): 93-99 (1999)
1993
6 Moshe Zviran, William J. Haga: A Comparison of Password Techniques for Multilevel Authentication Mechanisms. Comput. J. 36(3): 227-237 (1993)
5EEMoshe Zviran: A comprehensive methodology for computer family selection. Journal of Systems and Software 22(1): 17-26 (1993)
1991
4 William J. Haga, Moshe Zviran: Question-and-answer passwords: an empirical evaluation. Inf. Syst. 16(3): 335-343 (1991)
3EEMagdi N. Kamel, Moshe Zviran: A methodology for integrating heterogeneous data bases in a hospital environment. Journal of Systems and Software 15(3): 251-260 (1991)
1990
2EEMoshe Zviran, James C. Hoge, Val A. Micucci: SPAN - a DSS for security plan analysis. Computers & Security 9(2): 153-160 (1990)
1EEMoshe Zviran, William J. Haga: Cognitive passwords: The key to easy access control. Computers & Security 9(8): 723-736 (1990)

Coauthor Index

1Niv Ahituv [7] [10]
2Chanan Glezer [7] [8] [10] [12] [13]
3Ido Green [17]
4Yuval Gross [14]
5William J. Haga [1] [4] [6]
6Diego Hocksman [11]
7James C. Hoge [2]
8Magdi N. Kamel [3]
9Moshe Leshno [15] [16]
10Val A. Micucci [2]
11Seev Neumann [11]
12Tzvi Raz [17]
13Aviv Segev [15] [16]
14Dov Te'eni [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)