Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Cyber insurance: state of the art, trends and future directionsTsohou, Aggeliki ; Diamantopoulou, Vasiliki ; Gritzalis, Stefanos ; Lambrinoudakis, CostasInternational journal of information security, 2023-06, Vol.22 (3), p.737-748 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
2 |
Material Type: Artigo
|
A novel scalable intrusion detection system based on deep learningMighan, Soosan Naderi ; Kahani, MohsenInternational journal of information security, 2021-06, Vol.20 (3), p.387-403 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
3 |
Material Type: Artigo
|
A modular cyber security training programme for the maritime domainOruc, Aybars ; Chowdhury, Nabin ; Gkioulos, VasileiosInternational journal of information security, 2024-04, Vol.23 (2), p.1477-1512 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
4 |
Material Type: Artigo
|
Attacks on smart grid: power supply interruption and malicious power generationAdepu, Sridhar ; Kandasamy, Nandha Kumar ; Zhou, Jianying ; Mathur, AdityaInternational journal of information security, 2020-04, Vol.19 (2), p.189-211 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
5 |
Material Type: Artigo
|
A conceptual model of security contextJovanovikj, Vladimir ; Gabrijelčič, Dušan ; Klobučar, TomažInternational journal of information security, 2014-11, Vol.13 (6), p.571-581 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
6 |
Material Type: Artigo
|
Game strategies in network securityLye, Kong-wei ; Wing, Jeannette M.International journal of information security, 2005-02, Vol.4 (1-2), p.71-86 [Periódico revisado por pares]Heidelberg: Springer Nature B.VTexto completo disponível |
|
7 |
Material Type: Artigo
|
Delay-sensitive approaches for anonymizing numerical streaming dataZakerzadeh, Hessam ; Osborn, Sylvia L.International journal of information security, 2013-10, Vol.12 (5), p.423-437 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
8 |
Material Type: Artigo
|
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employeesFaizan Ali, Rao ; Dominic, P. D. D. ; Hina, Sadaf ; Naseer, SherazInternational journal of information security, 2024-04, Vol.23 (2), p.1197-1213 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
9 |
Material Type: Artigo
|
Protection against reverse engineering in ARMBen Yehuda, Raz ; Zaidenberg, Nezer JacobInternational journal of information security, 2020-02, Vol.19 (1), p.39-51 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
10 |
Material Type: Artigo
|
Understanding the spread of malicious mobile-phone programs and their damage potentialWang, Pu ; González, Marta C. ; Menezes, Ronaldo ; Barabási, Albert-LászlóInternational journal of information security, 2013-10, Vol.12 (5), p.383-392 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |