Cyber threats
The Use of the Internet by Terrorist Organizations
The Use of the Internet by Terrorist Organizations." Information & Security: An International Journal 34, no. 2 (2016): 137-150.
" 3409_rusumanov_use_of_the_internet_by_terrorist_organizations.pdf — Downloaded 4811 times
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
" 3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 2078 times
Assessing Cyber Security 2015
Assessing Cyber Security 2015." Information & Security: An International Journal 34, no. 2 (2016): 93-104.
" 3407_rademaker_assessing_cyber_security_2015.pdf — Downloaded 2742 times
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
" Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 5609 times
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
" Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 9655 times
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
" 1800_securing_cyberspace.pdf — Downloaded 1045 times
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4