default search action
Search dblp for Publications
export results for "toc:db/journals/ns/ns2016.bht:"
@article{DBLP:journals/ns/Brewer16, author = {Ross Brewer}, title = {Ransomware attacks: detection, prevention and cure}, journal = {Netw. Secur.}, volume = {2016}, number = {9}, pages = {5--9}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30086-1}, doi = {10.1016/S1353-4858(16)30086-1}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Brewer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Buratowski16, author = {Michael Buratowski}, title = {The {DNC} server breach: who did it and what does it mean?}, journal = {Netw. Secur.}, volume = {2016}, number = {10}, pages = {5--7}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30095-2}, doi = {10.1016/S1353-4858(16)30095-2}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Buratowski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Burdette16, author = {Phil Burdette}, title = {Timeline of an attack}, journal = {Netw. Secur.}, volume = {2016}, number = {9}, pages = {16--17}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30089-7}, doi = {10.1016/S1353-4858(16)30089-7}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Burdette16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Bush16, author = {Don Bush}, title = {How data breaches lead to fraud}, journal = {Netw. Secur.}, volume = {2016}, number = {7}, pages = {11--13}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30069-1}, doi = {10.1016/S1353-4858(16)30069-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Bush16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Crawley16, author = {Adrian Crawley}, title = {Hiring hackers}, journal = {Netw. Secur.}, volume = {2016}, number = {9}, pages = {13--15}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30088-5}, doi = {10.1016/S1353-4858(16)30088-5}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Crawley16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Dixit16, author = {Sameer Dixit}, title = {Holding the fort: a business case for testing security}, journal = {Netw. Secur.}, volume = {2016}, number = {6}, pages = {16--18}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30059-9}, doi = {10.1016/S1353-4858(16)30059-9}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Dixit16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Dixit16a, author = {Sameer Dixit}, title = {Opportunity vs risk with the Internet of Things}, journal = {Netw. Secur.}, volume = {2016}, number = {12}, pages = {8--10}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30115-5}, doi = {10.1016/S1353-4858(16)30115-5}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Dixit16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Eddolls16, author = {Matt Eddolls}, title = {Making cybercrime prevention the highest priority}, journal = {Netw. Secur.}, volume = {2016}, number = {8}, pages = {5--8}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30075-7}, doi = {10.1016/S1353-4858(16)30075-7}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Eddolls16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Everett16, author = {Cath Everett}, title = {Are passwords finally dying?}, journal = {Netw. Secur.}, volume = {2016}, number = {2}, pages = {10--14}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30017-4}, doi = {10.1016/S1353-4858(16)30017-4}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Everett16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Everett16a, author = {Cath Everett}, title = {Should encryption software be banned?}, journal = {Netw. Secur.}, volume = {2016}, number = {8}, pages = {14--17}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30078-2}, doi = {10.1016/S1353-4858(16)30078-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Everett16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Fenton16, author = {Mike Fenton}, title = {Restoring executive confidence: Red Team operations}, journal = {Netw. Secur.}, volume = {2016}, number = {11}, pages = {5--7}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30103-9}, doi = {10.1016/S1353-4858(16)30103-9}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Fenton16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Fimin16, author = {Michael Fimin}, title = {Breaking bad: avoiding the 10 worst {IT} admin habits}, journal = {Netw. Secur.}, volume = {2016}, number = {1}, pages = {8--11}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30007-1}, doi = {10.1016/S1353-4858(16)30007-1}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Fimin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Furnell16, author = {Steven Furnell}, title = {Vulnerability management: not a patch on where we should be?}, journal = {Netw. Secur.}, volume = {2016}, number = {4}, pages = {5--9}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30036-8}, doi = {10.1016/S1353-4858(16)30036-8}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Furnell16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Ganesan16, author = {Rajesh Ganesan}, title = {Stepping up security with password management control}, journal = {Netw. Secur.}, volume = {2016}, number = {2}, pages = {18--19}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30019-8}, doi = {10.1016/S1353-4858(16)30019-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Ganesan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/German16, author = {Paul German}, title = {A new month, a new data breach}, journal = {Netw. Secur.}, volume = {2016}, number = {3}, pages = {18--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30029-0}, doi = {10.1016/S1353-4858(16)30029-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/German16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/German16a, author = {Paul German}, title = {The {SIP} security fallacy}, journal = {Netw. Secur.}, volume = {2016}, number = {6}, pages = {18--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30060-5}, doi = {10.1016/S1353-4858(16)30060-5}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/German16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/German16b, author = {Paul German}, title = {Face the facts - your organisation will be breached}, journal = {Netw. Secur.}, volume = {2016}, number = {8}, pages = {9--10}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30076-9}, doi = {10.1016/S1353-4858(16)30076-9}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/German16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Grimm16, author = {John Grimm}, title = {{PKI:} crumbling under the pressure}, journal = {Netw. Secur.}, volume = {2016}, number = {5}, pages = {5--7}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30046-0}, doi = {10.1016/S1353-4858(16)30046-0}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Grimm16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Gross16, author = {Garrett Gross}, title = {Detecting and destroying botnets}, journal = {Netw. Secur.}, volume = {2016}, number = {3}, pages = {7--10}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30027-7}, doi = {10.1016/S1353-4858(16)30027-7}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Gross16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Hack16, author = {Michael Hack}, title = {The implications of Apple's battle with the {FBI}}, journal = {Netw. Secur.}, volume = {2016}, number = {7}, pages = {8--10}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30068-X}, doi = {10.1016/S1353-4858(16)30068-X}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Hack16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Hall16, author = {Mark Hall}, title = {Why people are key to cyber-security}, journal = {Netw. Secur.}, volume = {2016}, number = {6}, pages = {9--10}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30057-5}, doi = {10.1016/S1353-4858(16)30057-5}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Hall16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Harwood16, author = {Will Harwood}, title = {Locking up passwords - for good}, journal = {Netw. Secur.}, volume = {2016}, number = {4}, pages = {10--13}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30037-X}, doi = {10.1016/S1353-4858(16)30037-X}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Harwood16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/HaugheyEA16, author = {Hamish Haughey and Gregory Epiphaniou and Haider M. Al{-}Khateeb}, title = {Anonymity networks and the fragile cyber ecosystem}, journal = {Netw. Secur.}, volume = {2016}, number = {3}, pages = {10--18}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30028-9}, doi = {10.1016/S1353-4858(16)30028-9}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/HaugheyEA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Higgins16, author = {David Higgins}, title = {Anatomy of an attack: 'lights out' in Ukraine}, journal = {Netw. Secur.}, volume = {2016}, number = {11}, pages = {17--19}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30106-4}, doi = {10.1016/S1353-4858(16)30106-4}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Higgins16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Hughes16, author = {Duncan Hughes}, title = {Silent risk: new incarnations of longstanding threats}, journal = {Netw. Secur.}, volume = {2016}, number = {8}, pages = {17--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30079-4}, doi = {10.1016/S1353-4858(16)30079-4}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Hughes16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/KingE16, author = {Jason King and Dan Evans}, title = {Key criteria for selecting a secure cloud wireless net work}, journal = {Netw. Secur.}, volume = {2016}, number = {1}, pages = {17--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30010-1}, doi = {10.1016/S1353-4858(16)30010-1}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/KingE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Larson16, author = {Dave Larson}, title = {Distributed denial of service attacks - holding back the flood}, journal = {Netw. Secur.}, volume = {2016}, number = {3}, pages = {5--7}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30026-5}, doi = {10.1016/S1353-4858(16)30026-5}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Larson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Liu16, author = {Cricket Liu}, title = {Actively boosting network security with passive {DNS}}, journal = {Netw. Secur.}, volume = {2016}, number = {5}, pages = {18--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30050-2}, doi = {10.1016/S1353-4858(16)30050-2}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Liu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16, author = {Steve Mansfield{-}Devine}, title = {Security guarantees: building credibility for security vendors}, journal = {Netw. Secur.}, volume = {2016}, number = {2}, pages = {14--18}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30018-6}, doi = {10.1016/S1353-4858(16)30018-6}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16a, author = {Steve Mansfield{-}Devine}, title = {Your life in your hands: the security issues with healthcare apps}, journal = {Netw. Secur.}, volume = {2016}, number = {4}, pages = {14--18}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30038-1}, doi = {10.1016/S1353-4858(16)30038-1}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16b, author = {Steve Mansfield{-}Devine}, title = {Creating security operations centres that work}, journal = {Netw. Secur.}, volume = {2016}, number = {5}, pages = {15--18}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30049-6}, doi = {10.1016/S1353-4858(16)30049-6}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16c, author = {Steve Mansfield{-}Devine}, title = {The battle for privacy}, journal = {Netw. Secur.}, volume = {2016}, number = {6}, pages = {11--15}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30058-7}, doi = {10.1016/S1353-4858(16)30058-7}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16d, author = {Steve Mansfield{-}Devine}, title = {Securing small and medium-size businesses}, journal = {Netw. Secur.}, volume = {2016}, number = {7}, pages = {14--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30070-8}, doi = {10.1016/S1353-4858(16)30070-8}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16e, author = {Steve Mansfield{-}Devine}, title = {Ransomware: taking businesses hostage}, journal = {Netw. Secur.}, volume = {2016}, number = {10}, pages = {8--17}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30096-4}, doi = {10.1016/S1353-4858(16)30096-4}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16f, author = {Steve Mansfield{-}Devine}, title = {DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation's biggest nightmare}, journal = {Netw. Secur.}, volume = {2016}, number = {11}, pages = {7--13}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30104-0}, doi = {10.1016/S1353-4858(16)30104-0}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Mansfield-Devine16g, author = {Steve Mansfield{-}Devine}, title = {Data classification: keeping track of your most precious asset}, journal = {Netw. Secur.}, volume = {2016}, number = {12}, pages = {10--15}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30116-7}, doi = {10.1016/S1353-4858(16)30116-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Mansfield-Devine16g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Murphy16, author = {Malcolm Murphy}, title = {No place to hide as {DNS} comes under attack}, journal = {Netw. Secur.}, volume = {2016}, number = {7}, pages = {5--7}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30067-8}, doi = {10.1016/S1353-4858(16)30067-8}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Murphy16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Muscat16, author = {Ian Muscat}, title = {Web vulnerabilities: identifying patterns and remedies}, journal = {Netw. Secur.}, volume = {2016}, number = {2}, pages = {5--10}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30016-2}, doi = {10.1016/S1353-4858(16)30016-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Muscat16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Pittenger16, author = {Mike Pittenger}, title = {Know your open source code}, journal = {Netw. Secur.}, volume = {2016}, number = {5}, pages = {11--15}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30048-4}, doi = {10.1016/S1353-4858(16)30048-4}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Pittenger16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Pittenger16a, author = {Mike Pittenger}, title = {Addressing the security challenges of using containers}, journal = {Netw. Secur.}, volume = {2016}, number = {12}, pages = {5--8}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30114-3}, doi = {10.1016/S1353-4858(16)30114-3}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Pittenger16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Rafferty16, author = {Ben Rafferty}, title = {Dangerous skills gap leaves organisations vulnerable}, journal = {Netw. Secur.}, volume = {2016}, number = {8}, pages = {11--13}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30077-0}, doi = {10.1016/S1353-4858(16)30077-0}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Rafferty16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Renaud16, author = {Karen Renaud}, title = {No, users are not irrational}, journal = {Netw. Secur.}, volume = {2016}, number = {11}, pages = {20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30108-8}, doi = {10.1016/S1353-4858(16)30108-8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Renaud16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Rozanski16, author = {Shahaf Rozanski}, title = {Peering through the cloud}, journal = {Netw. Secur.}, volume = {2016}, number = {4}, pages = {19--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30039-3}, doi = {10.1016/S1353-4858(16)30039-3}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Rozanski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Shaulov16, author = {Michael Shaulov}, title = {Bridging mobile security gaps}, journal = {Netw. Secur.}, volume = {2016}, number = {1}, pages = {5--8}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30006-X}, doi = {10.1016/S1353-4858(16)30006-X}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Shaulov16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Snyder16, author = {Patrick Snyder}, title = {Playing hackers at their own game}, journal = {Netw. Secur.}, volume = {2016}, number = {11}, pages = {14--16}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30105-2}, doi = {10.1016/S1353-4858(16)30105-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Snyder16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Sollars16, author = {Marc Sollars}, title = {Risk-based security: staff can play the defining role in securing assets}, journal = {Netw. Secur.}, volume = {2016}, number = {9}, pages = {9--12}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30087-3}, doi = {10.1016/S1353-4858(16)30087-3}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Sollars16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Tankard16, author = {Colin Tankard}, title = {What the {GDPR} means for businesses}, journal = {Netw. Secur.}, volume = {2016}, number = {6}, pages = {5--8}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30056-3}, doi = {10.1016/S1353-4858(16)30056-3}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Tankard16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Tankard16a, author = {Colin Tankard}, title = {Smart buildings need joined-up security}, journal = {Netw. Secur.}, volume = {2016}, number = {10}, pages = {20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30098-8}, doi = {10.1016/S1353-4858(16)30098-8}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Tankard16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Tankard16b, author = {Colin Tankard}, title = {The danger within}, journal = {Netw. Secur.}, volume = {2016}, number = {12}, pages = {20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30118-0}, doi = {10.1016/S1353-4858(16)30118-0}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Tankard16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/TaylorHGWB16, author = {Mark John Taylor and John Haggerty and David Gresty and Chris Wren and Tom Berry}, title = {Avoiding the misuse of social media by employees}, journal = {Netw. Secur.}, volume = {2016}, number = {5}, pages = {8--11}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30047-2}, doi = {10.1016/S1353-4858(16)30047-2}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/TaylorHGWB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Touchette16, author = {Fred Touchette}, title = {The evolution of malware}, journal = {Netw. Secur.}, volume = {2016}, number = {1}, pages = {11--14}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30008-3}, doi = {10.1016/S1353-4858(16)30008-3}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Touchette16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Wagner16, author = {Mathias Wagner}, title = {The hard truth about hardware in cyber-security: it's more important}, journal = {Netw. Secur.}, volume = {2016}, number = {12}, pages = {16--19}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30117-9}, doi = {10.1016/S1353-4858(16)30117-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Wagner16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Wilkinson16, author = {William Wilkinson}, title = {Cyber discovery in investigations}, journal = {Netw. Secur.}, volume = {2016}, number = {1}, pages = {15--17}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30009-5}, doi = {10.1016/S1353-4858(16)30009-5}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Wilkinson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Zhang16, author = {Hongwen Zhang}, title = {How to disinfect and secure the Internet of Things}, journal = {Netw. Secur.}, volume = {2016}, number = {9}, pages = {18--20}, year = {2016}, url = {https://doi.org/10.1016/S1353-4858(16)30090-3}, doi = {10.1016/S1353-4858(16)30090-3}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Zhang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.