Search dblp for Publications

export results for "toc:db/journals/ns/ns2016.bht:"

 download as .bib file

@article{DBLP:journals/ns/Brewer16,
  author       = {Ross Brewer},
  title        = {Ransomware attacks: detection, prevention and cure},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {9},
  pages        = {5--9},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30086-1},
  doi          = {10.1016/S1353-4858(16)30086-1},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Brewer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Buratowski16,
  author       = {Michael Buratowski},
  title        = {The {DNC} server breach: who did it and what does it mean?},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {10},
  pages        = {5--7},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30095-2},
  doi          = {10.1016/S1353-4858(16)30095-2},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Buratowski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Burdette16,
  author       = {Phil Burdette},
  title        = {Timeline of an attack},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {9},
  pages        = {16--17},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30089-7},
  doi          = {10.1016/S1353-4858(16)30089-7},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Burdette16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Bush16,
  author       = {Don Bush},
  title        = {How data breaches lead to fraud},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {7},
  pages        = {11--13},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30069-1},
  doi          = {10.1016/S1353-4858(16)30069-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Bush16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Crawley16,
  author       = {Adrian Crawley},
  title        = {Hiring hackers},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {9},
  pages        = {13--15},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30088-5},
  doi          = {10.1016/S1353-4858(16)30088-5},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Crawley16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Dixit16,
  author       = {Sameer Dixit},
  title        = {Holding the fort: a business case for testing security},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {6},
  pages        = {16--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30059-9},
  doi          = {10.1016/S1353-4858(16)30059-9},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Dixit16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Dixit16a,
  author       = {Sameer Dixit},
  title        = {Opportunity vs risk with the Internet of Things},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {12},
  pages        = {8--10},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30115-5},
  doi          = {10.1016/S1353-4858(16)30115-5},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Dixit16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Eddolls16,
  author       = {Matt Eddolls},
  title        = {Making cybercrime prevention the highest priority},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {8},
  pages        = {5--8},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30075-7},
  doi          = {10.1016/S1353-4858(16)30075-7},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Eddolls16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Everett16,
  author       = {Cath Everett},
  title        = {Are passwords finally dying?},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {2},
  pages        = {10--14},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30017-4},
  doi          = {10.1016/S1353-4858(16)30017-4},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Everett16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Everett16a,
  author       = {Cath Everett},
  title        = {Should encryption software be banned?},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {8},
  pages        = {14--17},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30078-2},
  doi          = {10.1016/S1353-4858(16)30078-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Everett16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Fenton16,
  author       = {Mike Fenton},
  title        = {Restoring executive confidence: Red Team operations},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {11},
  pages        = {5--7},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30103-9},
  doi          = {10.1016/S1353-4858(16)30103-9},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Fenton16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Fimin16,
  author       = {Michael Fimin},
  title        = {Breaking bad: avoiding the 10 worst {IT} admin habits},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {1},
  pages        = {8--11},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30007-1},
  doi          = {10.1016/S1353-4858(16)30007-1},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Fimin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Furnell16,
  author       = {Steven Furnell},
  title        = {Vulnerability management: not a patch on where we should be?},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {4},
  pages        = {5--9},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30036-8},
  doi          = {10.1016/S1353-4858(16)30036-8},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Furnell16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Ganesan16,
  author       = {Rajesh Ganesan},
  title        = {Stepping up security with password management control},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {2},
  pages        = {18--19},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30019-8},
  doi          = {10.1016/S1353-4858(16)30019-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Ganesan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/German16,
  author       = {Paul German},
  title        = {A new month, a new data breach},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {3},
  pages        = {18--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30029-0},
  doi          = {10.1016/S1353-4858(16)30029-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/German16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/German16a,
  author       = {Paul German},
  title        = {The {SIP} security fallacy},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {6},
  pages        = {18--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30060-5},
  doi          = {10.1016/S1353-4858(16)30060-5},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/German16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/German16b,
  author       = {Paul German},
  title        = {Face the facts - your organisation will be breached},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {8},
  pages        = {9--10},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30076-9},
  doi          = {10.1016/S1353-4858(16)30076-9},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/German16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Grimm16,
  author       = {John Grimm},
  title        = {{PKI:} crumbling under the pressure},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {5},
  pages        = {5--7},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30046-0},
  doi          = {10.1016/S1353-4858(16)30046-0},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Grimm16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Gross16,
  author       = {Garrett Gross},
  title        = {Detecting and destroying botnets},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {3},
  pages        = {7--10},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30027-7},
  doi          = {10.1016/S1353-4858(16)30027-7},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Gross16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Hack16,
  author       = {Michael Hack},
  title        = {The implications of Apple's battle with the {FBI}},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {7},
  pages        = {8--10},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30068-X},
  doi          = {10.1016/S1353-4858(16)30068-X},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Hack16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Hall16,
  author       = {Mark Hall},
  title        = {Why people are key to cyber-security},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {6},
  pages        = {9--10},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30057-5},
  doi          = {10.1016/S1353-4858(16)30057-5},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Hall16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Harwood16,
  author       = {Will Harwood},
  title        = {Locking up passwords - for good},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {4},
  pages        = {10--13},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30037-X},
  doi          = {10.1016/S1353-4858(16)30037-X},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Harwood16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/HaugheyEA16,
  author       = {Hamish Haughey and
                  Gregory Epiphaniou and
                  Haider M. Al{-}Khateeb},
  title        = {Anonymity networks and the fragile cyber ecosystem},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {3},
  pages        = {10--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30028-9},
  doi          = {10.1016/S1353-4858(16)30028-9},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/HaugheyEA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Higgins16,
  author       = {David Higgins},
  title        = {Anatomy of an attack: 'lights out' in Ukraine},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {11},
  pages        = {17--19},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30106-4},
  doi          = {10.1016/S1353-4858(16)30106-4},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Higgins16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Hughes16,
  author       = {Duncan Hughes},
  title        = {Silent risk: new incarnations of longstanding threats},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {8},
  pages        = {17--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30079-4},
  doi          = {10.1016/S1353-4858(16)30079-4},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Hughes16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/KingE16,
  author       = {Jason King and
                  Dan Evans},
  title        = {Key criteria for selecting a secure cloud wireless net work},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {1},
  pages        = {17--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30010-1},
  doi          = {10.1016/S1353-4858(16)30010-1},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/KingE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Larson16,
  author       = {Dave Larson},
  title        = {Distributed denial of service attacks - holding back the flood},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {3},
  pages        = {5--7},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30026-5},
  doi          = {10.1016/S1353-4858(16)30026-5},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Larson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Liu16,
  author       = {Cricket Liu},
  title        = {Actively boosting network security with passive {DNS}},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {5},
  pages        = {18--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30050-2},
  doi          = {10.1016/S1353-4858(16)30050-2},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Liu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16,
  author       = {Steve Mansfield{-}Devine},
  title        = {Security guarantees: building credibility for security vendors},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {2},
  pages        = {14--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30018-6},
  doi          = {10.1016/S1353-4858(16)30018-6},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16a,
  author       = {Steve Mansfield{-}Devine},
  title        = {Your life in your hands: the security issues with healthcare apps},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {4},
  pages        = {14--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30038-1},
  doi          = {10.1016/S1353-4858(16)30038-1},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16b,
  author       = {Steve Mansfield{-}Devine},
  title        = {Creating security operations centres that work},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {5},
  pages        = {15--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30049-6},
  doi          = {10.1016/S1353-4858(16)30049-6},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16c,
  author       = {Steve Mansfield{-}Devine},
  title        = {The battle for privacy},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {6},
  pages        = {11--15},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30058-7},
  doi          = {10.1016/S1353-4858(16)30058-7},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16d,
  author       = {Steve Mansfield{-}Devine},
  title        = {Securing small and medium-size businesses},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {7},
  pages        = {14--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30070-8},
  doi          = {10.1016/S1353-4858(16)30070-8},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16e,
  author       = {Steve Mansfield{-}Devine},
  title        = {Ransomware: taking businesses hostage},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {10},
  pages        = {8--17},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30096-4},
  doi          = {10.1016/S1353-4858(16)30096-4},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16f,
  author       = {Steve Mansfield{-}Devine},
  title        = {DDoS goes mainstream: how headline-grabbing attacks could make this
                  threat an organisation's biggest nightmare},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {11},
  pages        = {7--13},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30104-0},
  doi          = {10.1016/S1353-4858(16)30104-0},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Mansfield-Devine16g,
  author       = {Steve Mansfield{-}Devine},
  title        = {Data classification: keeping track of your most precious asset},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {12},
  pages        = {10--15},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30116-7},
  doi          = {10.1016/S1353-4858(16)30116-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Mansfield-Devine16g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Murphy16,
  author       = {Malcolm Murphy},
  title        = {No place to hide as {DNS} comes under attack},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {7},
  pages        = {5--7},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30067-8},
  doi          = {10.1016/S1353-4858(16)30067-8},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Murphy16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Muscat16,
  author       = {Ian Muscat},
  title        = {Web vulnerabilities: identifying patterns and remedies},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {2},
  pages        = {5--10},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30016-2},
  doi          = {10.1016/S1353-4858(16)30016-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Muscat16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Pittenger16,
  author       = {Mike Pittenger},
  title        = {Know your open source code},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {5},
  pages        = {11--15},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30048-4},
  doi          = {10.1016/S1353-4858(16)30048-4},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Pittenger16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Pittenger16a,
  author       = {Mike Pittenger},
  title        = {Addressing the security challenges of using containers},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {12},
  pages        = {5--8},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30114-3},
  doi          = {10.1016/S1353-4858(16)30114-3},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Pittenger16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Rafferty16,
  author       = {Ben Rafferty},
  title        = {Dangerous skills gap leaves organisations vulnerable},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {8},
  pages        = {11--13},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30077-0},
  doi          = {10.1016/S1353-4858(16)30077-0},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Rafferty16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Renaud16,
  author       = {Karen Renaud},
  title        = {No, users are not irrational},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {11},
  pages        = {20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30108-8},
  doi          = {10.1016/S1353-4858(16)30108-8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Renaud16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Rozanski16,
  author       = {Shahaf Rozanski},
  title        = {Peering through the cloud},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {4},
  pages        = {19--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30039-3},
  doi          = {10.1016/S1353-4858(16)30039-3},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Rozanski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Shaulov16,
  author       = {Michael Shaulov},
  title        = {Bridging mobile security gaps},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {1},
  pages        = {5--8},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30006-X},
  doi          = {10.1016/S1353-4858(16)30006-X},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Shaulov16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Snyder16,
  author       = {Patrick Snyder},
  title        = {Playing hackers at their own game},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {11},
  pages        = {14--16},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30105-2},
  doi          = {10.1016/S1353-4858(16)30105-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Snyder16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Sollars16,
  author       = {Marc Sollars},
  title        = {Risk-based security: staff can play the defining role in securing
                  assets},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {9},
  pages        = {9--12},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30087-3},
  doi          = {10.1016/S1353-4858(16)30087-3},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Sollars16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Tankard16,
  author       = {Colin Tankard},
  title        = {What the {GDPR} means for businesses},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {6},
  pages        = {5--8},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30056-3},
  doi          = {10.1016/S1353-4858(16)30056-3},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Tankard16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Tankard16a,
  author       = {Colin Tankard},
  title        = {Smart buildings need joined-up security},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {10},
  pages        = {20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30098-8},
  doi          = {10.1016/S1353-4858(16)30098-8},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Tankard16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Tankard16b,
  author       = {Colin Tankard},
  title        = {The danger within},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {12},
  pages        = {20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30118-0},
  doi          = {10.1016/S1353-4858(16)30118-0},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Tankard16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/TaylorHGWB16,
  author       = {Mark John Taylor and
                  John Haggerty and
                  David Gresty and
                  Chris Wren and
                  Tom Berry},
  title        = {Avoiding the misuse of social media by employees},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {5},
  pages        = {8--11},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30047-2},
  doi          = {10.1016/S1353-4858(16)30047-2},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/TaylorHGWB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Touchette16,
  author       = {Fred Touchette},
  title        = {The evolution of malware},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {1},
  pages        = {11--14},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30008-3},
  doi          = {10.1016/S1353-4858(16)30008-3},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Touchette16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Wagner16,
  author       = {Mathias Wagner},
  title        = {The hard truth about hardware in cyber-security: it's more important},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {12},
  pages        = {16--19},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30117-9},
  doi          = {10.1016/S1353-4858(16)30117-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Wagner16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Wilkinson16,
  author       = {William Wilkinson},
  title        = {Cyber discovery in investigations},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {1},
  pages        = {15--17},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30009-5},
  doi          = {10.1016/S1353-4858(16)30009-5},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Wilkinson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Zhang16,
  author       = {Hongwen Zhang},
  title        = {How to disinfect and secure the Internet of Things},
  journal      = {Netw. Secur.},
  volume       = {2016},
  number       = {9},
  pages        = {18--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/S1353-4858(16)30090-3},
  doi          = {10.1016/S1353-4858(16)30090-3},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Zhang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}