![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Network Security, Volume 2015
Volume 2015, Number 1, January 2015
- Ben Densham:
Three cyber-security strategies to mitigate the impact of a data breach. 5-8 - Ashish Patel:
Network performance without compromising security. 9-12 - Guillermo Lafuente:
The big data security challenge. 12-14 - Steve Mansfield-Devine:
Managing identity for a competitive edge. 14-18 - Hongwen Zhang:
Bring your own encryption: balancing security with practicality. 18-20
Volume 2015, Number 2, February 2015
- Steve Mansfield-Devine:
The privacy dilemma. 5-10 - Poul Nielsen:
The importance of context in keeping end users secure. 10-13 - John Green:
Staying ahead of cyber-attacks. 13-16 - Gavin Millard:
Continuous monitoring for transient devices. 16-18 - Phil Beckett:
An intelligent approach to security. 18-20
Volume 2015, Number 3, March 2015
- Colin Tankard:
How secure is your building? 5-8 - Sol Cates:
The evolution of security intelligence. 8-10 - Cath Everett:
Should the dark net be taken out? 10-13 - Guy Buesnel:
Threats to satellite navigation systems. 14-18 - Gary Newe:
Delivering the Internet of Things. 18-20
Volume 2015, Number 4, April 2015
- Peter Clay:
A modern threat response framework. 5-10 - Mark Kedgley:
If you can't stop the breach, at least spot the breach. 11-12 - Mike Auty:
Anatomy of an advanced persistent threat. 13-16 - François Amigorena:
Relevance is the key to users' security understanding. 17-18 - Phil Beckett:
Getting your back-up data back up to date. 18-20
Volume 2015, Number 5, May 2015
- Ross Brewer:
Cyber threats: reducing the time to detection and response. 5-8 - Colin Tankard:
Data classification - the foundation of information security. 8-11 - Tracey Caldwell:
Hacktivism goes hardcore. 12-17 - Paul German:
The dangers of unsecured voice. 18-19
Volume 2015, Number 6, June 2015
- Tim Ring:
Keeping tabs on tracking technology. 5-8 - Stuart Hooson:
Smarten your data security before new EU legislation or risk corporate loss. 8-10 - Szilard Stange:
Detecting malware across operating systems. 11-14 - David Hald, Alex Udakis:
Rethinking remote authentication: time to kiss tokens goodbye? 15-17 - Boris Huard:
The data quality paradox. 18-20
Volume 2015, Number 7, July 2015
- Matt Kingswood:
Climate change will require more agile business continuity planning. 5-10 - Tim Ring:
Cloud security fears: fact or FUD? 10-14 - Matthew McKenna:
How federal agencies can secure their cloud migrations. 14-16 - Dave Larson, Stephen Gates:
Is it true that what you can't see can't hurt you? 17-18 - Steve Watts:
NFC and 2FA: the death of the password? 19-20
Volume 2015, Number 8, August 2015
- Vincent Smyth:
Cyber-security fortresses built on quicksand. 5-8 - Paul Simmonds:
The digital identity issue. 8-13 - Chris Richter:
Managing your data risk: back to basics. 13-15 - Ricky Knights, Emma Morris:
Move to intelligence-driven security. 15-18 - Darren Anstee:
Preparing for tomorrow's threat landscape. 18-20
Volume 2015, Number 9, September 2015
- Kevin Bocek:
Is HTTPS enough to protect governments? 5-8 - Steve Mansfield-Devine:
The Ashley Madison affair. 8-16 - Richard Kirk:
Cars of the future: the Internet of Things in the automotive industry. 16-18 - Shahaf Rozanski:
Using cloud data to accelerate forensic investigations. 19-20
Volume 2015, Number 10, October 2015
- Jan Hof:
Addressing new demands on network security. 5-7 - Chris Marrison:
Understanding the threats to DNS and how to secure it. 8-10 - Reuven Harrison:
Reducing complexity in securing heterogeneous networks. 11-13 - Steve Mansfield-Devine:
The growth and evolution of DDoS. 13-20
Volume 2015, Number 11, November 2015
- Steve Mansfield-Devine:
When advertising turns nasty. 5-8 - Paul German:
Counting the security cost of cheap calls. 9-11 - Tim Ring:
Connected cars - the next targe tfor hackers. 11-16 - Phil Beckett:
The business risks of using smartphones. 16-17 - Bradley Maule-ffinch:
Key trends in information security. 18-20
Volume 2015, Number 12, December 2015
- Richard Kirk:
Threat sharing - a neighbourhood watch for security practitioners. 5-7 - Tracey Caldwell:
Taking agile development beyond software - what are the security risks? 8-11 - Leon Adato:
Network outages - pick your battles. 12-13 - Steve Mansfield-Devine:
Under the radar. 14-18 - Steve Watts:
The holy grail of authentication. 18-19
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.