![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 57
Volume 57, March 2016
- Vikram S. Harichandran, Frank Breitinger
, Ibrahim M. Baggili, Andrew Marrington:
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. 1-13 - Alireza Shameli-Sendi, Rouzbeh Aghababaei-Barzegar, Mohamed Cheriet:
Taxonomy of information security risk assessment (ISRA). 14-30 - Malik Shahzad Kaleem Awan
, Pete Burnap
, Omer F. Rana
:
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. 31-46 - Jarrod West, Maumita Bhattacharya
:
Intelligent financial fraud detection: A comprehensive review. 47-66 - Boris Sieklik, Richard Macfarlane, William J. Buchanan
:
Evaluation of TFTP DDoS amplification attack. 67-92 - Gerson de Souza Faria
, Hae Yong Kim
:
Identification of pressed keys by time difference of arrivals of mechanical vibrations. 93-105
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.