Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Shamal Faily
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Human factors and cyber-security risks on the railway – the critical role played by signalling operations
Open Access
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (2): 236–263.
Published: 02 January 2024
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (5): 787–815.
Published: 16 August 2021
Journal Articles
A normative decision-making model for cyber security
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (5): 636–646.
Published: 17 June 2019
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (4): 435–446.
Published: 12 October 2015
Journal Articles
Designing and aligning e‐Science security culture with design
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (5): 339–349.
Published: 23 November 2010
