Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Mathias Ekstedt
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Investigating personal determinants of phishing and the effect of national culture
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (2): 178–199.
Published: 08 June 2015
Journal Articles
Estimates on the effectiveness of web application firewalls against targeted attacks
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (4): 250–265.
Published: 07 October 2013
Journal Articles
Estimates of success rates of remote arbitrary code execution attacks
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (2): 107–122.
Published: 01 June 2012
Journal Articles
Security mistakes in information system deployment projects
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (2): 80–94.
Published: 07 June 2011
