Loading…
Login
Scholar Register
Business Register
Subscribe
Loading…
Article Title
Abstract
Keyword
Category
MESH Heading
Grant Agency
RCAID
DOI
PMID
PMCID
Author
Affiliation
Email
Journal Title
ISSN
Publisher
Loading…
Contains
Equals
Find an Article
Find an Article (55740939)
Find a Category (125)
Find a Journal (6165)
Find a Scholar (3813)
Find an Academic Assistant (18)
Find an Article PDF (4643691)
Today's Articles (485)
Subscriber (50610)
Citation(s) in
RCA
8
(from Reference Citation Analysis)
Indexed Articles
Today (0)
Yesterday (0)
This Week (0)
Last Week (0)
Current Month (0)
Last Month (0)
Ranked By
Impact Index Per Article
Citation(s) in
RCA
Results Analysis
Year Published Analysis
Article Type Analysis
Journal Title Analysis
Category Analysis
Results Analysis
Year Published
2020 (1)
2019 (2)
2018 (1)
2015 (2)
2012 (1)
2009 (1)
Show more
Refine
Article Statistics
RCA (8)
SCIE (7)
ESCI (1)
Refine
Publication Titles
COMPUTERS & SECURITY (6)
COMPUTERS IN HUMAN BEHAVIOR (1)
JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS (1)
Show more
Refine
Category
Computer Science, Information Systems (6)
Psychology, Experimental (1)
Psychology, Multidisciplinary (1)
Statistics & Probability (1)
Show more
Refine
For:
Kjaerland M
.
A taxonomy and comparison of computer security incidents from the commercial and government sectors.
Comput Secur
2006. [DOI:
10.1016/j.cose.2006.08.004
]
[
Citation(s) in
RCA
: 40
]
[
Impact Index Per Article: 2.2
]
[
Reference Citation Analysis
]
[
What about the content of this article? (
0
)
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 11/25/2022]
Number
Cited by Other Article(s)
1
Desouza KC
, Ahmad A, Naseer H, Sharma M. Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT).
Comput Secur
2020. [DOI:
10.1016/j.cose.2019.101606
]
[
Citation(s) in
RCA
: 12
]
[
Impact Index Per Article: 3.0
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 11/28/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
2
Narwal B
, Mohapatra AK, Usmani KA. Towards a taxonomy of cyber threats against target applications.
JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS
2019. [DOI:
10.1080/09720510.2019.1580907
]
[
Citation(s) in
RCA
: 7
]
[
Impact Index Per Article: 1.4
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 10/27/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Bhawna Narwal
Indira Gandhi Delhi Technical University for Women, Kashmere Gate, New Delhi 110006, India
Amar Kumar Mohapatra
Indira Gandhi Delhi Technical University for Women, Kashmere Gate, New Delhi 110006, India
Kaleem Ahmed Usmani
Computer Emergency Responce Team of Mauritius, Post Louis Mauritius
Collapse
3
Toward a cybercrime classification ontology: A knowledge-based approach.
COMPUTERS IN HUMAN BEHAVIOR
2019. [DOI:
10.1016/j.chb.2018.11.039
]
[
Citation(s) in
RCA
: 17
]
[
Impact Index Per Article: 3.4
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 11/20/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
4
Social engineering in cybersecurity: The evolution of a concept.
Comput Secur
2018. [DOI:
10.1016/j.cose.2017.10.008
]
[
Citation(s) in
RCA
: 54
]
[
Impact Index Per Article: 9.0
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 11/19/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
5
Heurix J
, Zimmermann P, Neubauer T, Fenz S. A taxonomy for privacy enhancing technologies.
Comput Secur
2015. [DOI:
10.1016/j.cose.2015.05.002
]
[
Citation(s) in
RCA
: 19
]
[
Impact Index Per Article: 2.1
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 10/23/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
6
Combating advanced persistent threats: From network event correlation to incident detection.
Comput Secur
2015. [DOI:
10.1016/j.cose.2014.09.006
]
[
Citation(s) in
RCA
: 129
]
[
Impact Index Per Article: 14.3
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 11/21/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
7
HIPAA Privacy Rule compliance: An interpretive study using Norman’s action theory.
Comput Secur
2012. [DOI:
10.1016/j.cose.2011.12.002
]
[
Citation(s) in
RCA
: 7
]
[
Impact Index Per Article: 0.6
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 11/23/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
8
Liginlal D
, Sim I, Khansa L. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management.
Comput Secur
2009. [DOI:
10.1016/j.cose.2008.11.003
]
[
Citation(s) in
RCA
: 32
]
[
Impact Index Per Article: 2.1
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 10/21/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
Page 1 of 1
1
Loading…
Loading…
Export Articles to File
Export Citation Analysis
Export Citation Analysis
Article Number From
to
A maximum of 600 records can be exported at a time.
Format:
*
Excel
Plain Text
PDF
WORD
Invalid value
Loading…
Click to Download the Exported File
Loading…
Loading…
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA
Select the Category
Loading…
Loading…
Impact Index Per Article
Calculation for Impact Index Per Article
Times Cited ÷ Number of Years = Impact Index Per Article
TM
Loading…