Free database of papers and journals






Results 1 to 20 of 135 articles found
2012

Inside Cyber Warfare: Mapping the Cyber Underworld

Computers & Security (4.4 89), 31, 801.
2021

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic

Computers & Security (4.4 89), 105, 102248.
2012

Cyber Attacks

Computers & Security (4.4 89), 31, 251.
2013

Active cyber defense with denial and deception: A cyber-wargame experiment

Computers & Security (4.4 89), 37, 72-77.
1999

Cyber-crime the US experience

Computers & Security (4.4 89), 18, 16-18.
1998

Cyber Wars and other threats

Computers & Security (4.4 89), 17, 115-118.
2003

Cyber-terrorism in context

Computers & Security (4.4 89), 22, 188-192.
2021

Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence

Computers & Security (4.4 89), 109, 102396.
2021

Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness

Computers & Security (4.4 89), 108, 102357.
1998

Calling for a cyber cease-fire

Computers & Security (4.4 89), 17, 228.
1998

A guide to cyber-crime investigations

Computers & Security (4.4 89), 17, 579-582.
1999

Threat of cyber sabotage increases

Computers & Security (4.4 89), 18, 434-435.
1999

US backs cyber-crime Bill

Computers & Security (4.4 89), 18, 598.
1999

City braces itself for cyber attacks

Computers & Security (4.4 89), 18, 523.
2015

Cyber warfare: Issues and challenges

Computers & Security (4.4 89), 49, 70-94.
1997

Cyber extortion — The corporate response

Computers & Security (4.4 89), 16, 25-28.
1998

Cyber-IDs will soon be at your fingertips

Computers & Security (4.4 89), 17, 158.
2017

The cyber insurance market in Sweden

Computers & Security (4.4 89), 68, 130-144.
2001

Organized Crime Goes Cyber

Computers & Security (4.4 89), 20, 475-478.
2021

Cyber-resilience of Critical Cyber Infrastructures: integrating digital twins in the electric power ecosystem.

Computers & Security (4.4 89), , 102507.
Anatomy of Results
The left numbers are the publication year, and the number of citations (hyperlink to the full citation report of the paper)
paranthesis after the journal provides its impact factor.
paranthesis after the author indicates the number of publications and Author's Impact Factor
EXALY
Authors
Journals
Institutions