Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-7 of 7
Hannes Holm
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
So long, and thanks for only using readily available scripts
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (1): 47–61.
Published: 13 March 2017
Journal Articles
Investigating personal determinants of phishing and the effect of national culture
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (2): 178–199.
Published: 08 June 2015
Journal Articles
Using phishing experiments and scenario-based surveys to understand security behaviours in practice
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2014) 22 (4): 393–406.
Published: 07 October 2014
Journal Articles
Estimates on the effectiveness of web application firewalls against targeted attacks
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (4): 250–265.
Published: 07 October 2013
Journal Articles
Estimates of success rates of remote arbitrary code execution attacks
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (2): 107–122.
Published: 01 June 2012
Journal Articles
A quantitative evaluation of vulnerability scanning
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (4): 231–247.
Published: 11 October 2011
Journal Articles
Security mistakes in information system deployment projects
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (2): 80–94.
Published: 07 June 2011
