• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643691)   Today's Articles (485)   Subscriber (50610)
For: Kjaerland M. A taxonomy and comparison of computer security incidents from the commercial and government sectors. Comput Secur 2006. [DOI: 10.1016/j.cose.2006.08.004] [Citation(s) in RCA: 40] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
Number Cited by Other Article(s)
1
Desouza KC, Ahmad A, Naseer H, Sharma M. Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT). Comput Secur 2020. [DOI: 10.1016/j.cose.2019.101606] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
2
Narwal B, Mohapatra AK, Usmani KA. Towards a taxonomy of cyber threats against target applications. JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS 2019. [DOI: 10.1080/09720510.2019.1580907] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
3
Toward a cybercrime classification ontology: A knowledge-based approach. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2018.11.039] [Citation(s) in RCA: 17] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
4
Social engineering in cybersecurity: The evolution of a concept. Comput Secur 2018. [DOI: 10.1016/j.cose.2017.10.008] [Citation(s) in RCA: 54] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
5
Heurix J, Zimmermann P, Neubauer T, Fenz S. A taxonomy for privacy enhancing technologies. Comput Secur 2015. [DOI: 10.1016/j.cose.2015.05.002] [Citation(s) in RCA: 19] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
6
Combating advanced persistent threats: From network event correlation to incident detection. Comput Secur 2015. [DOI: 10.1016/j.cose.2014.09.006] [Citation(s) in RCA: 129] [Impact Index Per Article: 14.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
7
HIPAA Privacy Rule compliance: An interpretive study using Norman’s action theory. Comput Secur 2012. [DOI: 10.1016/j.cose.2011.12.002] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
8
Liginlal D, Sim I, Khansa L. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Comput Secur 2009. [DOI: 10.1016/j.cose.2008.11.003] [Citation(s) in RCA: 32] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA