You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Document V17N1.html
JISSec Volume 17, Number 1 (2021) contents
Document V17.html
JISSec contents: Volume 17
Cart Item JISSec_V19N1_Majadi_p57_CI
Shill Bidding Detection in Real-Time across Multiple Online Auctions, by Nazia Majadi and Jarrod Trevathan - Cart Item
Record V19N1_Majadi.html
Cart Item JISSec_V18N3_Bell_p177_CI
The Condro Group Hack: Infiltrating InstantSSL.it - A Case Study, by Christopher Bell - Cart Item
Record V18N3_Bell.html
Document V19N2.html
JISSec Volume 19, Number 2 (2023) contents
Record V16N3_Mukthapuram.html
Record V16N3_Marotta.html
File V20N2_FrontMatter.pdf
JISSec Volume 20, Number 2 Front Matter
Record V17N2_Mukhayer.html
Record V17N2_Ahmed.html
Cart Item JISSec_V19N1_Furnell_p3_CI
Assessing Organizational Awareness and Acceptance of Digital Security by Design, by Steven Furnell, Maria Bada and Joseph Kaberuka - Cart Item
Record V19N1_Furnell.html
Document V19N1.html
JISSec Volume 19, Number 1 (2023) contents
Cart Item JISSec_V19N2_Dzimiela_p97_CI
An Inside View of a Ransomware Attack Response and Recovery, by Casey Dzimiela and Murray E. Jennex - Cart Item
Record V19N2_Dzimiela.html
News Item Volume 18, Number 1
This is JISSec Volume 18, Number 1 launch announcement
Record V18N1_Gulati.html
Document V18.html
JISSec contents: Volume 18
Cart Item JISSec_V20N1_Higgs_p11_CI
Online Video Games: Cyberlaundering Vulnerabilities and Controls, by James Higgs and Stephen Flowerday - Cart Item
Record V20N1_Higgs.html
Record V20N1_Dhillon.html
File V20N1_Editorial.pdf
JISSec Volume 20, Number 1 Editorial
File V20N1_FrontMatter.pdf
JISSec Volume 20, Number 1 Front Matter
Document V20N1.html
JISSec Volume 20, Number 1 (2024) contents
Document V20.html
JISSec contents: Volume 20
Document V19.html
JISSec contents: Volume 19
News Item Volume 16, Number 2
This is JISSec Volume 16, Number 2 launch announcement
File V16N2_Pendegraft_p99_UMS.pdf
Security Dependent Parameters in a Predator Prey/Obligate Mutualism INFOSEC Model - Users More Sensitive (UMS), by Norman Pendegraft - Full Text