- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V17N1.html
-
JISSec Volume 17, Number 1 (2021) contents
-
V17.html
-
JISSec contents: Volume 17
-
JISSec_V19N1_Majadi_p57_CI
-
Shill Bidding Detection in Real-Time across Multiple Online Auctions, by Nazia Majadi and Jarrod Trevathan - Cart Item
-
V19N1_Majadi.html
-
-
JISSec_V18N3_Bell_p177_CI
-
The Condro Group Hack: Infiltrating InstantSSL.it - A Case Study, by Christopher Bell - Cart Item
-
V18N3_Bell.html
-
-
V19N2.html
-
JISSec Volume 19, Number 2 (2023) contents
-
V16N3_Mukthapuram.html
-
-
V16N3_Marotta.html
-
-
V20N2_FrontMatter.pdf
-
JISSec Volume 20, Number 2 Front Matter
-
V17N2_Mukhayer.html
-
-
V17N2_Ahmed.html
-
-
JISSec_V19N1_Furnell_p3_CI
-
Assessing Organizational Awareness and Acceptance of Digital Security by Design, by Steven Furnell, Maria Bada and Joseph Kaberuka - Cart Item
-
V19N1_Furnell.html
-
-
V19N1.html
-
JISSec Volume 19, Number 1 (2023) contents
-
JISSec_V19N2_Dzimiela_p97_CI
-
An Inside View of a Ransomware Attack Response and Recovery, by Casey Dzimiela and Murray E. Jennex - Cart Item
-
V19N2_Dzimiela.html
-
-
Volume 18, Number 1
-
This is JISSec Volume 18, Number 1 launch announcement
-
V18N1_Gulati.html
-
-
V18.html
-
JISSec contents: Volume 18
-
JISSec_V20N1_Higgs_p11_CI
-
Online Video Games: Cyberlaundering Vulnerabilities and Controls, by James Higgs and Stephen Flowerday - Cart Item
-
V20N1_Higgs.html
-
-
V20N1_Dhillon.html
-
-
V20N1_Editorial.pdf
-
JISSec Volume 20, Number 1 Editorial
-
V20N1_FrontMatter.pdf
-
JISSec Volume 20, Number 1 Front Matter
-
V20N1.html
-
JISSec Volume 20, Number 1 (2024) contents
-
V20.html
-
JISSec contents: Volume 20
-
V19.html
-
JISSec contents: Volume 19
-
Volume 16, Number 2
-
This is JISSec Volume 16, Number 2 launch announcement
-
V16N2_Pendegraft_p99_UMS.pdf
-
Security Dependent Parameters in a Predator Prey/Obligate Mutualism INFOSEC Model - Users More Sensitive (UMS), by Norman Pendegraft - Full Text