Publisher
Springer International Publishing
Reference18 articles.
1. Kim, D., Solomon, M. (2018). Fundamentals of information systems security. Information systems security & assurance series.
https://online.vitalsource.com/#/books/9781284128567/cfi/6/26!/4/2/6/2/32/6/2@0:56.5
.
2. Jararweh, Y., Al-Sharqawi. O., Abdulla, N., Lo’ai, T., & Mohammad, A. (2014). High-throughput encryption for cloud computing storage system. International Journal of Cloud Applications and Computing (IJCAC), 4(2), 1–14.
3. Agrafiotis, I., Eggenschwiler, J., Nurse, J. R. C. (2016). Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, 2016(11), 12–19.
https://doi.org/10.1016/S1361-3723(16)30091-4
.
4. Schultz, E. E. (2002) A framework for understanding and predicting insider attacks. Computers & Security, 21(6), 526–531.
https://www.sciencedirect.com/science/article/pii/S016740480201009
.
5. Al-Haija, Q. A. (2019). Autoregressive modeling and prediction of annual worldwide cybercrimes for cloud environments. In 2019 10th International Conference on Information and Communication Systems (ICICS) (pp. 47–51). IEEE.