Cyber threats
The Use of the Internet by Terrorist Organizations
The Use of the Internet by Terrorist Organizations." Information & Security: An International Journal 34, no. 2 (2016): 137-150.
" 3409_rusumanov_use_of_the_internet_by_terrorist_organizations.pdf — Downloaded 4901 times
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
" 3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 2118 times
Assessing Cyber Security 2015
Assessing Cyber Security 2015." Information & Security: An International Journal 34, no. 2 (2016): 93-104.
" 3407_rademaker_assessing_cyber_security_2015.pdf — Downloaded 2772 times
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
" Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 5648 times
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
" Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 9702 times
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
" 1800_securing_cyberspace.pdf — Downloaded 1064 times
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4