Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Julie J. C. H. Ryan
@inproceedings{DBLP:conf/hicss/SissonR16, author = {Philip William Sisson and Julie J. C. H. Ryan}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Towards a Unified Theory of Knowledge Management {(KM)}}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {4313--4322}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.535}, doi = {10.1109/HICSS.2016.535}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SissonR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/RyanMRCC12, author = {Julie J. C. H. Ryan and Thomas A. Mazzuchi and Daniel J. Ryan and Juliana Lopez de la Cruz and Roger M. Cooke}, title = {Quantifying information security risks using expert judgment elicitation}, journal = {Comput. Oper. Res.}, volume = {39}, number = {4}, pages = {774--784}, year = {2012}, url = {https://doi.org/10.1016/j.cor.2010.11.013}, doi = {10.1016/J.COR.2010.11.013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cor/RyanMRCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PettigrewR12, author = {James Pettigrew and Julie J. C. H. Ryan}, title = {Making Successful Security Decisions: {A} Qualitative Evaluation}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {1}, pages = {60--68}, year = {2012}, url = {https://doi.org/10.1109/MSP.2011.128}, doi = {10.1109/MSP.2011.128}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PettigrewR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AminRD12, author = {Rohan M. Amin and Julie J. C. H. Ryan and Johan Ren{\'{e}} van Dorp}, title = {Detecting Targeted Malicious Email}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {3}, pages = {64--71}, year = {2012}, url = {https://doi.org/10.1109/MSP.2011.154}, doi = {10.1109/MSP.2011.154}, timestamp = {Sun, 19 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AminRD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RyanR08, author = {Julie J. C. H. Ryan and Daniel J. Ryan}, title = {Performance Metrics for Information Security Risk Management}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {5}, pages = {38--44}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.125}, doi = {10.1109/MSP.2008.125}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RyanR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Ryan07, author = {Julie J. C. H. Ryan}, title = {Plagiarism, Graduate Education, and Information Security}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {5}, pages = {62--65}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.119}, doi = {10.1109/MSP.2007.119}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Ryan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iks/BurgosRM07, author = {Carlos L. Burgos and Julie J. C. H. Ryan and Edward Lile Murphree}, title = {Through a mirror darkly: How programmers understand legacy code}, journal = {Inf. Knowl. Syst. Manag.}, volume = {6}, number = {3}, pages = {215--234}, year = {2007}, url = {http://content.iospress.com/articles/information-knowledge-systems-management/iks00102}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iks/BurgosRM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RyanR06, author = {Julie J. C. H. Ryan and Daniel J. Ryan}, title = {Expected benefits of information security investments}, journal = {Comput. Secur.}, volume = {25}, number = {8}, pages = {579--588}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.08.001}, doi = {10.1016/J.COSE.2006.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RyanR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iks/Al-KahtaniRJ06, author = {Nouf K. M. Al{-}Kahtani and Julie J. C. H. Ryan and Theresa I. Jefferson}, title = {How Saudi female faculty perceive internet technology usage and potential}, journal = {Inf. Knowl. Syst. Manag.}, volume = {5}, number = {4}, pages = {227--243}, year = {2006}, url = {http://content.iospress.com/articles/information-knowledge-systems-management/iks00095}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iks/Al-KahtaniRJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Ryan04, author = {Julie J. C. H. Ryan}, title = {Information Security Tools and Practices: What Works?}, journal = {{IEEE} Trans. Computers}, volume = {53}, number = {8}, pages = {1060--1063}, year = {2004}, url = {https://doi.org/10.1109/TC.2004.45}, doi = {10.1109/TC.2004.45}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Ryan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/Ryan04, author = {Julie J. C. H. Ryan}, title = {Architecting information assurance}, booktitle = {Proceedings of the 23rd {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2004, April 15-17, 2004, Phoenix, Arizona, {USA}}, pages = {669--673}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/PCCC.2004.1395131}, doi = {10.1109/PCCC.2004.1395131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/Ryan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.