The Battle Against Security Attacks (original) (raw)

Getting Ahead of the Threat

Richard Strelitz

2008

View PDFchevron_right

Protecting against cyber threats in networked information systems

vipin kumar

Battlespace Digitization and Network-Centric Systems III, 2003

View PDFchevron_right

Rendered Insecure

Hoda Naghibijouybari

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

View PDFchevron_right

A Survey on Computer and Network Security Attacks

Anwar Alzaid

IJARCCE, 2019

View PDFchevron_right

Web Services Security: Threats and Challenges

Prof. L. Udaya Kumar

International Journal of Computer Applications, 2015

View PDFchevron_right

Cybersecurity risk

Serghei A Ohrimenco

2024

View PDFchevron_right

Integrated security analysis

Kevin Tomsovic

View PDFchevron_right

Analysis of Information System Threats

Inomjon Yarashov

2021

View PDFchevron_right

Resistance through ‘Robber-Talk’

Emily Zobel Marshall

Caribbean Quarterly, 2016

View PDFchevron_right

The New Age of Terrorism

Brian Jenkins

2006

View PDFchevron_right

Computer and Network Security [Working Title]

Jaydip Sen

2019

View PDFchevron_right

Security of Information and Communication Technologies

Zoran Cekerevac

FBIM Transactions, 2019

View PDFchevron_right

Advances in Security in Computing and Communications

MUFTAH FRAIFER

Advances in Security in Computing and Communications

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Cyber Security

marvin odhiambo

View PDFchevron_right

A “Cookbook” for Vulnerability Research

Armando Valdés Velásquez

Frontiers in Public Health, 2019

View PDFchevron_right

The perennial problem of evil

Mark Piper

Think, 2003

View PDFchevron_right

Security Challenges from Abuse of Cloud Service Threat

Dr. Ishrat Ahmad

International Journal of Computing and Digital Systems, 2019

View PDFchevron_right

Securing the Future

Elizabeth McAnarney

Archives of Pediatrics & Adolescent Medicine, 1996

View PDFchevron_right

Network Security: Vulnerabilities and Disclosure Policy*

Chaim Fershtman

The Journal of Industrial Economics, 2010

View PDFchevron_right

Is security a lost cause?

Chris Mitchell

chrismitchell.net

View PDFchevron_right

Security Projects for Systems and Networking Professionals

Hamid Arabnia

Emerging Trends in ICT Security, 2014

View PDFchevron_right

Barbarians at the Open Gates

Gabor Scheiring

The American Sociologist, 2007

View PDFchevron_right

Special Issue on Terror and Security

Susana Araújo

2014

View PDFchevron_right

Users are not the enemy

Anne Adams

Communications of the ACM, 1999

View PDFchevron_right

Challenges in Combating the Cyber Crime

ahmet nuredini

Mediterranean Journal of Social Sciences, 2014

View PDFchevron_right

The Vulnerable Subject

Kate Schick

The Vulnerable Subject, 2013

View PDFchevron_right

Web Application Vulnerabilities: A Survey

Himanshu Yadav

International Journal of Computer Applications, 2014

View PDFchevron_right

Software vulnerability analysis

Ivan Krsul

1998

View PDFchevron_right

In Defence of War

nigel biggar

New Blackfriars, 2014

View PDFchevron_right

Shifting Security Paradigms. Toward Resilience

Lewis Perelman

View PDFchevron_right

Privacy Versus Security in the Internet Era

Razvan Serbu

Procedia Economics and Finance, 2015

View PDFchevron_right

Some roots of terrorism

Jianguo Liu

2002

View PDFchevron_right

Justifying Cyber-intelligence?

Ross Bellaby

Journal of Military Ethics, 2016

View PDFchevron_right

Cyber-Security Threats Origins and their Analysis

Maroš Čergeť

Acta Polytechnica Hungarica, 2022

View PDFchevron_right