default search action
Computers & Security, Volume 57
Volume 57, March 2016
- Vikram S. Harichandran, Frank Breitinger, Ibrahim M. Baggili, Andrew Marrington:
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. 1-13 - Alireza Shameli-Sendi, Rouzbeh Aghababaei-Barzegar, Mohamed Cheriet:
Taxonomy of information security risk assessment (ISRA). 14-30 - Malik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana:
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. 31-46 - Jarrod West, Maumita Bhattacharya:
Intelligent financial fraud detection: A comprehensive review. 47-66 - Boris Sieklik, Richard Macfarlane, William J. Buchanan:
Evaluation of TFTP DDoS amplification attack. 67-92 - Gerson de Souza Faria, Hae Yong Kim:
Identification of pressed keys by time difference of arrivals of mechanical vibrations. 93-105
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.