![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 38
Volume 38, October 2013
- Dimitris Gritzalis, Gurvirender Tejay:
Cybercrime in the Digital Economy - Editorial. 1-2 - Moussa Ouedraogo, Haralambos Mouratidis
:
Selecting a Cloud Service Provider in the age of cybercrime. 3-13 - Javier López
, Cristina Alcaraz
, Rodrigo Roman:
Smart control of operational threats in control substations. 14-27 - Xin (Robert) Luo, Wei Zhang, Stephen D. Burd, Alessandro F. Seazzu:
Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration. 28-38 - Theodoros Spyridopoulos
, G. Karanikas, Theodore Tryfonas
, Georgios Oikonomou
:
A game theoretic defence framework against DoS/DDoS cyber attacks. 39-50 - Alexios Mylonas
, Vasilis Meletiadis, Lilian Mitrou, Dimitris Gritzalis:
Smartphone sensor data as digital evidence. 51-75 - Theocharis Tsigkritis, George Spanoudakis:
Assessing the genuineness of events in runtime monitoring of cyber systems. 76-96 - Rossouw von Solms, Johan Van Niekerk
:
From information security to cyber security. 97-102 - Michael D. Kohn, Mariki M. Eloff
, Jan H. P. Eloff:
Integrated digital forensic process model. 103-115
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.