4 research outputs found
Mobile phishing attacks and defence mechanisms: State of art and open research challenges
- Author
- Abu-Nimeh
- Adewole
- Advantis
- Almeida
- Almomani
- Amrutkar
- Ankit Kumar Jain
- Arachchilage
- Arachchilage
- Arachchilage
- Arachchilage
- Arachchilage
- Asanka
- AUJAS
- Bicakci
- Bottazzi
- Bugiel
- BullGuard
- Canbay
- Cao
- CAPEC
- Carroll
- Choi
- Chorghe
- Chorghe
- Choudhary
- Choudhary
- CISCO
- Cormack
- Cranor
- Delac
- Delany
- Department of Telematics
- Digital Guardian
- Diksha Goel
- Dublin Institute of Technology
- Dunham
- El-Alfy
- Felt
- FireEye
- Foozy
- Gomez Hidalgo
- Grace
- Gupta
- Gupta
- Han
- Hauri
- He
- Hong
- How-To Geek
- IMPERVA
- Infosec institute
- Infosec institute
- Infosec Institute
- Jain
- Jain
- Jain
- Jeon
- Joo
- Karami
- Kessem
- Khonji
- Khurana
- Kim
- Krombholz
- Landman
- Lee
- Li
- Lifewire
- Liu
- Liu
- Marforio
- Marforio
- Marforio
- Mimecast
- Mobile Ecosystem Forum
- Moore
- Mukhopadhyay
- Nortan
- OpenPhish
- Ott
- Ott
- Ott
- Parker
- Parsons
- PCWorld
- PHISHING.org
- PHISHING.org
- Phishingpro
- Phishload
- Phishtank
- Proofpoint
- Rastogi
- Richardson
- SANS
- Search security
- Search security
- Security through education
- Shabtai
- Shahriar
- Sharifi
- Silva
- Singh
- Statista
- Statista
- Symantec
- Symantec
- Tagg
- Tewari
- The Honeynet Project
- Tripathi
- Uysal
- Wandera
- Wu
- Wu
- Yadav
- Yang
- Yeboah-Boateng
- Zuo
- Publication venue
- 'Elsevier BV'
- Publication date
- Field of study
A Review of Moving Target Defense Mechanisms for Internet of Things Applications
- Author
- Al‐Shaer Ehab
- Ashton Kevin
- Bates Regis J.
- Buyya Rajkumar
- Casola Valentina
- Doraswamy Naganand
- Forouzan Behrouz A.
- Gutierrez Jose A.
- Hunkeler Urs
- Jafar Haadi H.
- Jafarian Jafar Haadi
- Johnson David B.
- Lam Simon S.
- Lampe Jonathan
- Ma Duohe
- Ma Duohe
- Masse Mark
- Richardson Matt
- SANS Institute InfoSec Reading Room
- Tonyali Samet
- Tsiftes Nicolas
- Zhao Zheng
- Publication venue
- 'Wiley'
- Publication date
- Field of study
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
- Author
- Acquisti
- Agrafiotis
- Anderson
- Anderson
- Anderson
- Andoh-Baidoo
- Ashley
- Beck
- Beck
- Brenner
- Campbell
- Cavusoglu
- Charles
- Dark Reading
- Edwards
- Elo
- ENISA
- Felici
- Gartzke
- Giddens
- Gizmodo
- Gratz
- Greenberg A. Hackers remotely killed a jeep on the highway- with me in it
- Greenfield
- Harvard Mental Health Letter
- Hess A. Inside the Sony hack
- Hovav
- Howard
- Hsieh
- Hutchins
- InfoSec Institute
- Infosec Institute
- ISACA
- JP Morgan Chase reveals massive data breach affecting 76m households
- JP Morgan security exec reassigned after breach
- Kannan
- Kesan
- Klahr
- Kleinig
- Krebs on Security
- Kshetri
- Kvochko
- Laube
- Lee T. Forget the Ashley Madison or Sony Hacks – a crippling cyberattack is imminent in the US
- Levi
- Lloyds of London
- McDaid L. Talktalk cyber-attack: county Londonderry man targeted
- Moore
- National Institute of Standards Technology
- New Zealand Government. Risk Assessment Process: Information Security
- Nguyen
- Oxford English Dictionary
- Paolo Passeri Hackmageddon
- Pemberton
- Punter
- PwC
- Schulhofer
- Sharpe
- Singapore personal data hack hits 1. 5m health authority says
- Sony seeking more cybersecurity staff amid hack
- Spalek
- Talktalk hackers go on £600 spending spree with stolen card details as boss says its too early to consider compensation
- Telang
- The Huffington Post
- The Parliament of the Commonwealth of Australia
- Titcomb J. Ukrainian blackout blamed on cyber-attack
- Top data security expert fears traumatic aftermath in Ashley Madison hack
- U. K. Government
- Uber concealed huge data breach
- UK Government and Marsh Ltd
- US Department of Homeland Security
- UVM
- Van Slyke
- Variety
- Veris Community
- White L. and Bergin T. Tesco says $3million stolen in cyber theft resumes service
- Why it pays to complain via Twitter
- Woods
- World Economic Forum
- Zou
- Çetin
- Publication venue
- 'Oxford University Press (OUP)'
- Publication date
- Field of study
Blockchain's adoption in IoT: The challenges, and a way forward
- Author
- Adelantado
- Ahlmeyer
- Al-Fuqaha
- Alastria
- Androulaki
- Aniello
- Arias
- Armknecht
- Balamurugan
- Baliga
- Bentov
- Bessani
- Biswas
- Bitcoin-Forum
- Bitcoin.org
- Bitcoinwiki
- Bonneau
- Borgohain
- Brewer
- Brewer
- Brody
- Buterin
- Buterin
- Buterin
- Buterin
- Cachin
- Cachin
- Carpov
- Castro
- Castro
- Chen
- Chen
- Christidis
- Christoph
- Conoscenti
- Decker
- Dinh
- Dorri
- Dorri
- Ducklin
- EconoTimes
- Ergen
- Erik
- Ethcore
- EthEmbedded
- Eyal
- Eyal
- Gaetani
- Gao
- Garzik
- Gideon
- Gilad
- Gutierrez
- Haider Abbas
- Hardjono
- Houy
- Huckle
- Huh
- Hyperledger-fabric documentation
- Iain
- IBM
- Imran Makhdoom
- Infosec-Institute
- James
- James
- Jing
- Kastelein
- Kastelein
- Khan
- Khan
- Khari
- Konstantinos
- Kosba
- Koushanfar
- Kovacs
- Kshetri
- Kumar
- Kwon
- Lamport
- Larimer
- Lee
- Leiding
- Li
- Litecoin
- Lough
- Lukas
- Lund
- Luu
- Makhdoom
- Mehran Abolhasan
- Michael
- Miller
- Min
- MIT-Media-Lab
- Nakamoto
- NEO.org
- Neo.org
- Oraclize
- OWASP
- Pilkington
- Poon
- Popov
- Preethi
- Prisco
- Puthal
- Qiu
- Ramachandran
- Reid
- REX-Blog
- Ruckebusch
- Sadeghi
- Sara
- Scherer
- Schneider
- Sebastián
- Sharma
- Sinha
- Sivaraman
- Slimcoin
- Sophos-Naked-Security
- Steemit
- Szabo
- Taherkordi
- Telehash
- The CEO's Guide to Data Security
- The-Linux-Foundation
- Tschorsch
- Tuesta
- Underwood
- Vanhoef
- Vukolić
- Wei Ni
- Wood
- Wurm
- Wüst
- Yli-Huumo
- Yu
- Zhang
- Zheng
- Zheng
- Zyskind
- Zyskind
- Publication venue
- 'Elsevier BV'
- Publication date
- Field of study
