Cyber threats
The Use of the Internet by Terrorist Organizations
The Use of the Internet by Terrorist Organizations." Information & Security: An International Journal 34, no. 2 (2016): 137-150.
" 3409_rusumanov_use_of_the_internet_by_terrorist_organizations.pdf — Downloaded 4917 times
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
" 3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 2127 times
Assessing Cyber Security 2015
Assessing Cyber Security 2015." Information & Security: An International Journal 34, no. 2 (2016): 93-104.
" 3407_rademaker_assessing_cyber_security_2015.pdf — Downloaded 2777 times
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
" Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 5654 times
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
" Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 9705 times
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
" 1800_securing_cyberspace.pdf — Downloaded 1072 times
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4