Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-6 of 6
Vasilios Katos
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Actionable threat intelligence for digital forensics readiness
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (2): 273–291.
Published: 11 February 2019
Journal Articles
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (1): 2–19.
Published: 14 March 2016
Journal Articles
Reengineering the user: privacy concerns about personal data on smartphones
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (4): 394–405.
Published: 12 October 2015
Journal Articles
Language-independent gender identification through keystroke analysis
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (3): 286–301.
Published: 13 July 2015
Journal Articles
An integrated model for online transactions: illuminating the black box
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (3): 184–206.
Published: 13 July 2012
Journal Articles
A partial equilibrium view on security and privacy
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (1): 74–83.
Published: 21 March 2008
