default search action
Computers & Security, Volume 98
Volume 98, November 2020
- Hong Rong, Jian Liu, Wei Wu, Jialu Hao, Huimei Wang, Ming Xian:
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment. 101969 - Pengcheng Xia, Haoyu Wang, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Guoai Xu:
Characterizing cryptocurrency exchange scams. 101993 - Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
Compliance with bring your own device security policies in organizations: A systematic literature review. 101998 - Joseph W. Mikhail, Jamie C. Williams, George R. Roelke:
procmonML: Generating evasion resilient host-based behavioral analytics from tree ensembles. 102002 - Moneer Alshaikh:
Developing cybersecurity culture to influence employee behavior: A practice perspective. 102003 - Wei Xiong, Li Xiong:
Data resource protection based on smart contract. 102004 - Aos Mulahuwaish, Kevin Gyorick, Kayhan Zrar Ghafoor, Halgurd S. Maghdid, Danda B. Rawat:
Efficient classification model of web news documents using machine learning algorithms for accurate information. 102006 - Feng Xu, Merrill Warkentin:
Integrating elaboration likelihood model and herd theory in information security message persuasiveness. 102009 - Tie Hou, Victoria Wang:
Industrial espionage - A systematic literature review (SLR). 102019 - Marcus A. Butavicius, Kathryn Parsons, Meredith Lillie, Agata McCormac, Malcolm R. Pattinson, Dragana Calic:
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale. 102020
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.