nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Characterizing cryptocurrency exchange scams
|
Xia, Pengcheng |
|
|
98 |
C |
p. |
artikel |
2 |
Compliance with bring your own device security policies in organizations: A systematic literature review
|
Palanisamy, Rathika |
|
|
98 |
C |
p. |
artikel |
3 |
Data resource protection based on smart contract
|
Xiong, Wei |
|
|
98 |
C |
p. |
artikel |
4 |
Developing cybersecurity culture to influence employee behavior: A practice perspective
|
Alshaikh, Moneer |
|
|
98 |
C |
p. |
artikel |
5 |
Editorial Board
|
|
|
|
98 |
C |
p. |
artikel |
6 |
Efficient classification model of web news documents using machine learning algorithms for accurate information
|
Mulahuwaish, Aos |
|
|
98 |
C |
p. |
artikel |
7 |
Industrial espionage – A systematic literature review (SLR)
|
Hou, Tie |
|
|
98 |
C |
p. |
artikel |
8 |
Integrating elaboration likelihood model and herd theory in information security message persuasiveness
|
Xu, Feng |
|
|
98 |
C |
p. |
artikel |
9 |
procmonML: Generating evasion resilient host-based behavioral analytics from tree ensembles
|
Mikhail, Joseph W. |
|
|
98 |
C |
p. |
artikel |
10 |
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment
|
Rong, Hong |
|
|
98 |
C |
p. |
artikel |
11 |
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale
|
Butavicius, Marcus |
|
|
98 |
C |
p. |
artikel |