Cyber threats
The Use of the Internet by Terrorist Organizations
The Use of the Internet by Terrorist Organizations." Information & Security: An International Journal 34, no. 2 (2016): 137-150.
3409_rusumanov_use_of_the_internet_by_terrorist_organizations.pdf — Downloaded 3728 times
"
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 1504 times
"
Assessing Cyber Security 2015
Assessing Cyber Security 2015." Information & Security: An International Journal 34, no. 2 (2016): 93-104.
3407_rademaker_assessing_cyber_security_2015.pdf — Downloaded 2358 times
"
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 5104 times
"
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 9015 times
"
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
1800_securing_cyberspace.pdf — Downloaded 901 times
"
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4