Emm et al., 2016
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Tuleun | Analysis of cybercrimes, major cyber security attacks and the overall economic impact on Nigeria | |
| Sabillon et al. | Cybercrime and cybercriminals: A comprehensive study | |
| Broadhurst et al. | Malware trends on ‘darknet’crypto-markets: Research review | |
| Pande | Introduction to cyber security | |
| Ben-David et al. | Computing security in the developing world: A case for multidisciplinary research | |
| Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
| Barroso | Botnets-the silent threat | |
| Iovan et al. | From cyber threats to cyber-crime | |
| Emm et al. | IT threat evolution in Q2 2015 | |
| Broadhurst | Cybercrime: Thieves, swindlers, bandits, and privateers in cyberspace | |
| Sonowal | Introduction to phishing | |
| Omar | A world of cyber attacks (a survey) | |
| DS et al. | A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants | |
| Scharfman | Crypto phishing and spoofing scams | |
| Emm et al. | IT threat evolution in Q3 2016 | |
| MacEwan | A tricky situation: Deception in cyberspace | |
| Särökaari | Phishing attacks and mitigation tactics | |
| Droppa et al. | Analysis of cybersecurity in the real environment | |
| Emm et al. | It threat evolution in Q2 2016 | |
| TĂBUȘCĂ et al. | CYBERSECURITY EDUCATION-THE NEW LITERACY. | |
| Sowrirajan | A literature based study on cyber security vulnerabilities | |
| Mitră | The Structure of Cyber Attacks | |
| Furnell | Internet threats to end-users: Hunting easy prey | |
| Krishnan | Exploitation of Human Trust, Curiosity and Ignorance by Malware | |
| Broadhurst et al. | Cybercrime update: trends and developments |