


default search action
Computers & Security, Volume 38
Volume 38, October 2013
- Dimitris Gritzalis, Gurvirender Tejay:

Cybercrime in the Digital Economy - Editorial. 1-2 - Moussa Ouedraogo, Haralambos Mouratidis

:
Selecting a Cloud Service Provider in the age of cybercrime. 3-13 - Javier López

, Cristina Alcaraz
, Rodrigo Roman:
Smart control of operational threats in control substations. 14-27 - Xin (Robert) Luo, Wei Zhang, Stephen D. Burd, Alessandro F. Seazzu:

Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration. 28-38 - Theodoros Spyridopoulos

, G. Karanikas, Theodore Tryfonas
, Georgios Oikonomou
:
A game theoretic defence framework against DoS/DDoS cyber attacks. 39-50 - Alexios Mylonas

, Vasilis Meletiadis, Lilian Mitrou, Dimitris Gritzalis:
Smartphone sensor data as digital evidence. 51-75 - Theocharis Tsigkritis, George Spanoudakis:

Assessing the genuineness of events in runtime monitoring of cyber systems. 76-96 - Rossouw von Solms, Johan Van Niekerk

:
From information security to cyber security. 97-102 - Michael D. Kohn, Mariki M. Eloff

, Jan H. P. Eloff:
Integrated digital forensic process model. 103-115

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














