Browse by Journal
Number of items: 4.
A
Agrafiotis, Ioannis, Nurse, Jason R. C., Buckley, Oliver, Legg, Phil, Creese, Sadie, Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67505) |
B
Bowles, Stephen, Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58386) |
E
Eggenschwiler, Jacqueline, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, 2016 (11). pp. 12-19. ISSN 1361-3723. (doi:10.1016/S1361-3723(16)30091-4) (KAR id:67480) |
H
Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0) (KAR id:38400) |