Cyber threats
Cyberspace as the Environment Affected by Organized Crime Activity
Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64.
Cyberspace Affected by Organized Crime — Downloaded 5732 times
"
![application/pdf](/modules/file/icons/application-pdf.png)
The Use of the Internet by Terrorist Organizations
The Use of the Internet by Terrorist Organizations." Information & Security: An International Journal 34, no. 2 (2016): 137-150.
3409_rusumanov_use_of_the_internet_by_terrorist_organizations.pdf — Downloaded 6062 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 2781 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Assessing Cyber Security 2015
Assessing Cyber Security 2015." Information & Security: An International Journal 34, no. 2 (2016): 93-104.
3407_rademaker_assessing_cyber_security_2015.pdf — Downloaded 3309 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 6354 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 10360 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
1800_securing_cyberspace.pdf — Downloaded 1362 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4