![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Network Security, Volume 2017
Volume 2017, Number 1, January 2017
- Jamie Graves:
Data flow management: why and how. 5-6 - Steve Mansfield-Devine:
Open source software: determining the real risk posed by vulnerabilities. 7-12 - Michael Wood:
How to make SD-WAN secure. 12-14 - Paul German:
Is your Session Border Controller providing a false sense of security? 14-16 - Bill Welch:
Exploiting the weaknesses of SS7. 17-19 - Karen Renaud
:
Webcam covering phenomenon. 20
Volume 2017, Number 2, February 2017
- Andy Lilly:
IMSI catchers: hacking mobile communications. 5-7 - Jack Bedell-Pearce:
When big data and Brexit collide. 8-9 - Jamie Graves:
What is intellectual property and how do you protect it? 9-11 - Gert-Jan Schenk:
Retailers must focus on the growing cyberthreat landscape. 12-13 - Steve Mansfield-Devine:
A process of defence - securing industrial control systems. 14-19 - Tim Erridge:
Optimising risk management. 20
Volume 2017, Number 3, March 2017
- Colin Tankard:
Encryption as the cornerstone of big data security. 5-7 - Lewis Henderson:
National infrastructure - the next step for seasoned hackers. 8-10 - Vincent Smyth:
Software vulnerability management: how intelligence helps reduce the risk. 10-12 - Nick Hawkins:
Why communication is vital during a cyber-attack. 12-14 - Tim Ring:
The Russians are coming! Are security firms over-hyping the hacker threat? 15-18 - Andy Green:
Ransomware and the GDPR. 18-19 - Colin Tankard:
The Firewall: The eSignature comes of age. 20
Volume 2017, Number 4, April 2017
- SM-D:
Hiding Behind the Keyboard. 4 - Leon Adato:
Monitoring and automation: it's easier than you think. 5-7 - Steve Mansfield-Devine:
Fileless attacks: compromising targets without malware. 7-11 - Alan Zeichick:
Enabling innovation by opening up the network. 12-14 - Rohit Talwar, April Koury:
Artificial intelligence - the next frontier in IT security? 14-17 - Mark Hickman:
The threat from inside. 18-19 - Karen Renaud
:
Facts do not change minds. 20
Volume 2017, Number 5, May 2017
- SM-D:
Practical Packet Analysis Chris Sanders. 4 - SM-D:
We Know All About You Rhodri Jeffreys-Jones. 4 - Sean Newman:
Service providers: the gatekeepers of Internet security. 5-7 - Jacob Gajek:
Macro malware: dissecting a malicious Word document. 8-13 - Steve Mansfield-Devine:
Threat hunting: assuming the worst to strengthen resilience. 13-17 - Travis Farral
:
The attribution problem with information security attacks. 17-19 - Tim Erridge:
Gaining strength. 20
Volume 2017, Number 6, June 2017
- Daniel Shugrue:
Fighting application threats with cloud-based WAFs. 5-8 - Jesper Zerlang:
GDPR: a milestone in convergence for cyber-security and compliance. 8-11 - Jay Botelho:
How automating data collection can improve cyber-security. 11-13 - Steve Mansfield-Devine:
Leaks and ransoms - the key threats to healthcare organisations. 14-19 - Colin Tankard:
Securing emails. 20
Volume 2017, Number 7, July 2017
- Simon Parkinson
:
Use of access control to minimise ransomware impact. 5-8 - Michael Wood:
Top requirements on the SD-WAN security checklist. 9-11 - Mark Taylor, Denis Reilly
, Brett Lempereur:
An access control management protocol for Internet of Things devices. 11-17 - Malcolm Murphy:
The Internet of Things and the threat it poses to DNS. 17-19 - Karen Renaud
:
It makes you Wanna Cry. 20
Volume 2017, Number 8, August 2017
- Jeff Luszcz:
How maverick developers can create risk in the software and IoT supply chain. 5-7 - Eileen Haggerty:
Healthcare and digital transformation. 7-11 - Tom Major:
Weaponising threat intelligence data. 11-13 - Paul German:
Time to bury dedicated hardware-based security solutions. 13-15 - Steve Mansfield-Devine:
Adapting to the disappearing perimeter. 15-19 - Tim Erridge:
Good will hunting. 20
Volume 2017, Number 9, September 2017
- Travis Farral
:
Nation-state attacks: practical defences against advanced adversaries. 5-7 - Jon Condra:
Assessing nation state threats. 8-10 - Adam Vincent:
State-sponsored hackers: the new normal for business. 10-12 - Nick Robinson, Keith Martin:
Distributed denial of government: the Estonian Data Embassy Initiative. 13-16 - Phil Beckett:
Data and IP are the new nuclear: facing up to state-sponsored threats. 17-19 - Colin Tankard:
Who are the attackers? 20
Volume 2017, Number 10, October 2017
- Eric Lundbohm:
Understanding nation-state attacks. 5-8 - John Bambenek:
Nation-state attacks: the new normal. 8-10 - Brian Laing:
Cyber global warming: six steps towards meltdown. 11-13 - Steve Mansfield-Devine:
Weaponising the Internet of Things. 13-19 - Karen Renaud
, Gareth Renaud:
To phish, or not to phish... 20
Volume 2017, Number 11, November 2017
- Chris Steffen:
Should jump box servers be consigned to history? 5-6 - Nick Thompson:
Putting security at the heart of app development. 7-8 - Akashdeep Bhardwaj
, Sam Goundar
:
Security challenges for cloud-based email infrastructure. 8-15 - Steve Mansfield-Devine:
Going critical: attacks against national infrastructure. 16-19 - Colin Tankard:
BYOE: New kid on the block. 20
Volume 2017, Number 12, December 2017
- Steven Furnell, Ismini Vasileiou
:
Security education and awareness: just let them burn? 5-9 - Filippo Lauria:
How to footprint, report and remotely secure compromised IoT devices. 10-16 - Steve Mansfield-Devine:
The right response: how organisations should react to security incidents. 16-19 - Tim Erridge:
A framework for threats. 20
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.