The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Journal of Management Information Systems
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers
Journal of Management Information Systems
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Malicious hubs: detecting abnormally malicious autonomous systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
A tale of two CTs: IP packets rejected by a firewall
Proceedings of the 2012 Information Security Curriculum Development Conference
Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Cyber-victimization and cybersecurity in China
Communications of the ACM
Electronic Commerce Research
Hi-index | 48.23 |
Attackers base themselves in countries of convenience, virtually.