


default search action
Network Security, Volume 2015
Volume 2015, Number 1, January 2015
- Ben Densham:

Three cyber-security strategies to mitigate the impact of a data breach. 5-8 - Ashish Patel:

Network performance without compromising security. 9-12 - Guillermo Lafuente:

The big data security challenge. 12-14 - Steve Mansfield-Devine:

Managing identity for a competitive edge. 14-18 - Hongwen Zhang:

Bring your own encryption: balancing security with practicality. 18-20
Volume 2015, Number 2, February 2015
- Steve Mansfield-Devine:

The privacy dilemma. 5-10 - Poul Nielsen:

The importance of context in keeping end users secure. 10-13 - John Green:

Staying ahead of cyber-attacks. 13-16 - Gavin Millard:

Continuous monitoring for transient devices. 16-18 - Phil Beckett:

An intelligent approach to security. 18-20
Volume 2015, Number 3, March 2015
- Colin Tankard:

How secure is your building? 5-8 - Sol Cates:

The evolution of security intelligence. 8-10 - Cath Everett:

Should the dark net be taken out? 10-13 - Guy Buesnel:

Threats to satellite navigation systems. 14-18 - Gary Newe:

Delivering the Internet of Things. 18-20
Volume 2015, Number 4, April 2015
- Peter Clay:

A modern threat response framework. 5-10 - Mark Kedgley:

If you can't stop the breach, at least spot the breach. 11-12 - Mike Auty:

Anatomy of an advanced persistent threat. 13-16 - François Amigorena:

Relevance is the key to users' security understanding. 17-18 - Phil Beckett:

Getting your back-up data back up to date. 18-20
Volume 2015, Number 5, May 2015
- Ross Brewer:

Cyber threats: reducing the time to detection and response. 5-8 - Colin Tankard:

Data classification - the foundation of information security. 8-11 - Tracey Caldwell:

Hacktivism goes hardcore. 12-17 - Paul German:

The dangers of unsecured voice. 18-19
Volume 2015, Number 6, June 2015
- Tim Ring:

Keeping tabs on tracking technology. 5-8 - Stuart Hooson:

Smarten your data security before new EU legislation or risk corporate loss. 8-10 - Szilard Stange:

Detecting malware across operating systems. 11-14 - David Hald, Alex Udakis:

Rethinking remote authentication: time to kiss tokens goodbye? 15-17 - Boris Huard:

The data quality paradox. 18-20
Volume 2015, Number 7, July 2015
- Matt Kingswood:

Climate change will require more agile business continuity planning. 5-10 - Tim Ring:

Cloud security fears: fact or FUD? 10-14 - Matthew McKenna:

How federal agencies can secure their cloud migrations. 14-16 - Dave Larson, Stephen Gates:

Is it true that what you can't see can't hurt you? 17-18 - Steve Watts:

NFC and 2FA: the death of the password? 19-20
Volume 2015, Number 8, August 2015
- Vincent Smyth:

Cyber-security fortresses built on quicksand. 5-8 - Paul Simmonds:

The digital identity issue. 8-13 - Chris Richter:

Managing your data risk: back to basics. 13-15 - Ricky Knights, Emma Morris:

Move to intelligence-driven security. 15-18 - Darren Anstee:

Preparing for tomorrow's threat landscape. 18-20
Volume 2015, Number 9, September 2015
- Kevin Bocek:

Is HTTPS enough to protect governments? 5-8 - Steve Mansfield-Devine:

The Ashley Madison affair. 8-16 - Richard Kirk:

Cars of the future: the Internet of Things in the automotive industry. 16-18 - Shahaf Rozanski:

Using cloud data to accelerate forensic investigations. 19-20
Volume 2015, Number 10, October 2015
- Jan Hof:

Addressing new demands on network security. 5-7 - Chris Marrison:

Understanding the threats to DNS and how to secure it. 8-10 - Reuven Harrison:

Reducing complexity in securing heterogeneous networks. 11-13 - Steve Mansfield-Devine:

The growth and evolution of DDoS. 13-20
Volume 2015, Number 11, November 2015
- Steve Mansfield-Devine:

When advertising turns nasty. 5-8 - Paul German:

Counting the security cost of cheap calls. 9-11 - Tim Ring:

Connected cars - the next targe tfor hackers. 11-16 - Phil Beckett:

The business risks of using smartphones. 16-17 - Bradley Maule-ffinch:

Key trends in information security. 18-20
Volume 2015, Number 12, December 2015
- Richard Kirk:

Threat sharing - a neighbourhood watch for security practitioners. 5-7 - Tracey Caldwell:

Taking agile development beyond software - what are the security risks? 8-11 - Leon Adato:

Network outages - pick your battles. 12-13 - Steve Mansfield-Devine:

Under the radar. 14-18 - Steve Watts:

The holy grail of authentication. 18-19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














