Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/acsac/Anderson92
%A Anderson, James P.
%B ACSAC
%D 1992
%I IEEE
%K dblp
%T Computer security myths mythtakes or 'The real security problem is...'.
%U http://dblp.uni-trier.de/db/conf/acsac/acsac1992.html#Anderson92
@inproceedings{conf/acsac/Anderson92,
added-at = {2017-03-30T00:00:00.000+0200},
author = {Anderson, James P.},
biburl = {https://www.bibsonomy.org/bibtex/27714b1771ab93139302ade39155b4206/dblp},
booktitle = {ACSAC},
crossref = {conf/acsac/1992},
ee = {http://dx.doi.org/10.1109/CSAC.1992.228240},
interhash = {735561c8dfdad882772181ef69a6b4e9},
intrahash = {7714b1771ab93139302ade39155b4206},
keywords = {dblp},
publisher = {IEEE},
timestamp = {2017-03-31T11:38:25.000+0200},
title = {Computer security myths mythtakes or 'The real security problem is...'.},
url = {http://dblp.uni-trier.de/db/conf/acsac/acsac1992.html#Anderson92},
year = 1992
}