CORE
CO
nnecting
RE
positories
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Research partnership
About
About
About us
Our mission
Team
Blog
FAQs
Contact us
Community governance
Governance
Advisory Board
Board of supporters
Research network
Innovations
Our research
Labs
Filters
8 research outputs found
Large File Received
Author
[email protected]
Publication venue
Publication date
07/12/2017
Field of study
No full text
Ezid
Choosing patient and clinic management systems: capability versus usability
Author
Information Commission
Proofpoint
Publication venue
'Mark Allen Group'
Publication date
Field of study
No full text
Crossref
HATCH: Hack And Trick Capricious Humans – A Serious Game on Social Engineering
Author
Beckers K Pape S
Beckers K Pape S
+15 more
Csikszentmihalyi M
Denning T Lerner A, Shostack A, Kohno T
Gulati R
Hadnagy C
Hadnagy C
Kruger H Kearney W
Mitnick K Simon W
Peltier T
Proofpoint
Rheinberg F Vollmeyer R, Engeser S
Shostack A
Shostack A
Stajano F Wilson P
Williams L Gegick M, Meneely A
Williams L Meneely A, Shipley G
Publication venue
'BCS Learning and Development Limited'
Publication date
Field of study
No full text
Crossref
Hybrid Wars: 21st Centuryys New Threats to Global Peace and Security
Author
A Patel
C Clausewitz
+43 more
F Baloch
F Braudel
F G Hoffman
F G Hoffman
F G Hoffman
F�rsvarsh�gskolan
H Gunneriusson
H Jaber
Hakan Gunneriusson
Hezbollah-Israeli War
I Varenytsia
Ibid
Ibid
Ibid
J &
J D�ge
J Halliday
J Moore
J Norberg
J Whalen
J?nis B
Jagoindia
L Marcus
M Aaronson
M Miklaucic
M Roscini
Nato See
On
P Paganini
Proofpoint
R Olearchyk
Roth
S
S Lain
S-D &
S-D Bachmann
Sascha-Dominik Oliver Vladimir Bachmann
See
See Bachmann
See Traynor
Sun-Tzu
Sutyagin
Sverigesradio
Publication venue
'Elsevier BV'
Publication date
01/01/2014
Field of study
No full text
Crossref
The dark side of social networking sites:Understanding phishing risks
Author
Abbasi
Al Zamal
+78 more
Algarni
Algarni
Alowibdi
Andrea Back
Baker
Blakley
Boyd
Buller
Carlson
Castillo
Chitrey
Chu
Cialdini
Cohen
Conti
Debatin
Dhamija
Donath
Dwyer
Egelman
Eisend
Fagnot
Ferguson
Gragg
Grazioli
Grow
Harris
Healey
Hekkala
Herath
Hesseldahl
Hogben
Hong
Jagatic
Jakobsson
Jakobsson
Johnston
Kaspersky
Kuikka
Kvedar
Li
Light
Lindsey
Liu
Luo
Malik
Marett
Mario Silic
Mitnick
Molok
Nagy
O'Keefe
Ong
Parsons
Posey
Proofpoint research
PwC
PwC
Richardson
Rosenblum
Ruighaver
SANS
Silic
Silic
Silic
Silic
Skeels
Stanton
Steyn
Sundie
Szwedo
Vishwanath
Vishwanath
Wang
Warkentin
Workman
Wright
Wright
Publication venue
'Elsevier BV'
Publication date
Field of study
No full text
Crossref
Wannacry, Ransomware, and the Emerging Threat to Corporations
Author
Adam J Sulkowski
Bernard S Black
+54 more
C F R See
C Peter
Christine Hurt
Cybersecurity Trautman
E G See
E Ormerod-Trautman
Gilson &
Hillary A Sale
Id
Id
J Lawrence
J Lawrence
J Lawrence
J Lawrence
J Lawrence
J Lawrence
J Lawrence
J Ronald
Janet E Kerr
Julian Velasco
Kerr
L NO
Lawrence J Trautman
Lawrence J Trautman
Lawrence J Trautman
Lawrence J Trautman
Lawrence J Trautman
Lawrence J Trautman
Lawrence J Trautman
Lawrence J Trautman
Lawrence J Trautman
Lawrence J. Trautman
Leo E Strine
Melvin A Eisenberg
Nat&apos
P Q Lyman
Peter Ormerod
President Barak Obama
Proofpoint See
Sean J Griffith
See Id
See Lawrence
See Lawrence
See Lawrence
See Lawrence
See Lawrence
See Morse
See Rev
See Smedinghoff
See Smedinghoff
See Thomas
Stephen M See Also
Trautman
U Bus L Rev
Publication venue
'Elsevier BV'
Publication date
01/01/2018
Field of study
No full text
Crossref
A blockchain future for internet of things security: a position paper
Author
Abazari
Abbott-McCune
+94 more
Abraham
Al-Douri
Ali
Almotiri
Alsunbul
Ammar
Arya
Ben Saied
Bennaceur
Bouchami
Boukhtouta
Cadet
Chang
Chen
Chen
Chen
Christidis
Christoforidis
Cordero
Dewanjee
El Makkaoui
Farhaoui
Filipek
Ford
Freudiger
Freudiger
Ganesh
Gharib
Ghorbani
Herold
Hiran
Hwang
Indre
Indumathi
Jin
Jokar
Kalnoor
Karantjias
Keshri
Kim
Koelle
Kolev
Kumawat
Leau
Li
Liang
Liu
Liu
Mac Dermott
Machado
Merlo
Mirza
Mirza
Monshizadeh
Narang
Neha
Noureddine
Olagunju
Oluwaseun
Osanaiye
Osop
Pan
Papastergiou
Park
Patel
Prokhorenko
Proofpoint
Qinglin
Rashid
Rathee
Salek
Sallabi
Sanders
Sato
Sedjelmaci
Sedjelmaci
Shaghaghi
Sharma
Sharma
Shi
Sonchack
Su
Swapna
Takahashi
Vasilomanolakis
Vij
Wagner
Waskita
Wilson
Xie
Yacchirena
Yevdokymenko
Zhang
Zitta
Publication venue
'Elsevier BV'
Publication date
Field of study
No full text
Crossref
Mobile phishing attacks and defence mechanisms: State of art and open research challenges
Author
Abu-Nimeh
Adewole
+117 more
Advantis
Almeida
Almomani
Amrutkar
Ankit Kumar Jain
Arachchilage
Arachchilage
Arachchilage
Arachchilage
Arachchilage
Asanka
AUJAS
Bicakci
Bottazzi
Bugiel
BullGuard
Canbay
Cao
CAPEC
Carroll
Choi
Chorghe
Chorghe
Choudhary
Choudhary
CISCO
Cormack
Cranor
Delac
Delany
Department of Telematics
Digital Guardian
Diksha Goel
Dublin Institute of Technology
Dunham
El-Alfy
Felt
FireEye
Foozy
Gomez Hidalgo
Grace
Gupta
Gupta
Han
Hauri
He
Hong
How-To Geek
IMPERVA
Infosec institute
Infosec institute
Infosec Institute
Jain
Jain
Jain
Jeon
Joo
Karami
Kessem
Khonji
Khurana
Kim
Krombholz
Landman
Lee
Li
Lifewire
Liu
Liu
Marforio
Marforio
Marforio
Mimecast
Mobile Ecosystem Forum
Moore
Mukhopadhyay
Nortan
OpenPhish
Ott
Ott
Ott
Parker
Parsons
PCWorld
PHISHING.org
PHISHING.org
Phishingpro
Phishload
Phishtank
Proofpoint
Rastogi
Richardson
SANS
Search security
Search security
Security through education
Shabtai
Shahriar
Sharifi
Silva
Singh
Statista
Statista
Symantec
Symantec
Tagg
Tewari
The Honeynet Project
Tripathi
Uysal
Wandera
Wu
Wu
Yadav
Yang
Yeboah-Boateng
Zuo
Publication venue
'Elsevier BV'
Publication date
Field of study
No full text
Crossref