books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 88
Main
Computers & Security
Volume 88
Computers & Security
Volume 88
1
A framework for competence development and assessment in hybrid cybersecurity exercises
Brilingaitė, Agnė
,
Bukauskas, Linas
,
Juozapavičius, Aušrius
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 1.86 MB
Your tags:
english, 2020
2
Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT)
Desouza, Kevin C.
,
Ahmad, Atif
,
Naseer, Humza
,
Sharma, Munish
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 1.04 MB
Your tags:
english, 2020
3
Encrypted and covert DNS queries for botnets: Challenges and countermeasures
Patsakis, Constantinos
,
Casino, Fran
,
Katos, Vasilios
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 2.26 MB
Your tags:
english, 2020
4
A security modeling and verification method of embedded software based on Z and MARTE
Hu, Xinwen
,
Zhuang, Yi
,
Zhang, Fuyuan
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 5.26 MB
Your tags:
english, 2020
5
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
Xu, Guangquan
,
Guo, Bingjiang
,
Su, Chunhua
,
Zheng, Xi
,
Liang, Kaitai
,
Wong, Duncan S.
,
Wang, Hao
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 2.31 MB
Your tags:
english, 2020
6
Forecasting IT security vulnerabilities – An empirical analysis
Yasasin, Emrah
,
Prester, Julian
,
Wagner, Gerit
,
Schryen, Guido
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 2.30 MB
Your tags:
english, 2020
7
Editorial: Special issue on security and privacy in smart cyber-physical systems
ben Othmane, Lotfi
,
Jacobson, Doug
,
Weippl, Edgar
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 200 KB
Your tags:
english, 2020
8
Heuristic-based strategy for Phishing prediction: A survey of URL-based approach
Silva, Carlo Marcelo Revoredo da
,
Feitosa, Eduardo Luzeiro
,
Garcia, Vinicius Cardoso
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 5.06 MB
Your tags:
english, 2020
9
State of the art in information security policy development
Paananen, Hanna
,
Lapke, Michael
,
Siponen, Mikko
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 1.18 MB
Your tags:
english, 2020
10
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking
Yazdinejad, Abbas
,
Parizi, Reza M.
,
Dehghantanha, Ali
,
Choo, Kim-Kwang Raymond
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 3.89 MB
Your tags:
english, 2020
11
A security modeling and verification method of embedded software based on Z and MARTE
Hu, Xinwen
,
Zhuang, Yi
,
Zhang, Fuyuan
Journal:
Computers & Security
Year:
2020
File:
PDF, 5.26 MB
Your tags:
2020
12
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
Xu, Guangquan
,
Guo, Bingjiang
,
Su, Chunhua
,
Zheng, Xi
,
Liang, Kaitai
,
Wong, Duncan S.
,
Wang, Hao
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.31 MB
Your tags:
2020
13
Forecasting IT security vulnerabilities – An empirical analysis
Yasasin, Emrah
,
Prester, Julian
,
Wagner, Gerit
,
Schryen, Guido
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.30 MB
Your tags:
2020
14
Editorial: Special issue on security and privacy in smart cyber-physical systems
ben Othmane, Lotfi
,
Jacobson, Doug
,
Weippl, Edgar
Journal:
Computers & Security
Year:
2020
File:
PDF, 200 KB
Your tags:
2020
15
Heuristic-based strategy for Phishing prediction: A survey of URL-based approach
Silva, Carlo Marcelo Revoredo da
,
Feitosa, Eduardo Luzeiro
,
Garcia, Vinicius Cardoso
Journal:
Computers & Security
Year:
2020
File:
PDF, 5.06 MB
Your tags:
2020
16
FKR: An efficient authentication scheme for IEEE 802.11ah networks
Zhang, Lyuye
,
Ma, Maode
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 1.50 MB
Your tags:
english, 2020
17
FKR: An efficient authentication scheme for IEEE 802.11ah networks
Zhang, Lyuye
,
Ma, Maode
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.50 MB
Your tags:
2020
18
Editorial Board
Journal:
Computers & Security
Year:
2020
File:
PDF, 55 KB
Your tags:
2020
19
Reviewer Acknowledgement 2019
Journal:
Computers & Security
Year:
2020
File:
PDF, 302 KB
Your tags:
2020
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×