Browse by Journal

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: B | H | N | P | S
Number of items: 5.

B

Binbeshr, Farid and Kiah, Miss Laiha. Mat and Por, Lip Yee and Zaidan, A. A. (2021) A systematic review of PIN-entry methods resistant to shoulder-surfing attacks. Computers & Security, 101. ISSN 0167-4048, DOI https://doi.org/10.1016/j.cose.2020.102116.

H

Hussain, Muzammil and Al-Haiqi, Ahmed and Zaidan, Aws Alaa and Zaidan, Bilal Bahaa and Kiah, Miss Laiha Mat and Iqbal, Salman and Iqbal, Sarwat and Abdulnabi, Mohamed (2018) A security framework for mHealth apps on Android platform. Computers & Security, 75. pp. 191-217. ISSN 0167-4048, DOI https://doi.org/10.1016/j.cose.2018.02.003.

N

Nader, S.S. (2015) Information security conscious care behaviour formation in organizations. Computers & Security, 53. pp. 65-78. ISSN 0167-4048, DOI https://doi.org/10.1016/j.cose.2015.05.012.

P

Palanisamy, Rathika and Norman, Azah Anir and Kiah, Miss Laiha Mat (2020) Compliance with bring your own device security policies in organizations: A systematic literature review. Computers & Security, 98. ISSN 0167-4048, DOI https://doi.org/10.1016/j.cose.2020.101998.

S

Sohrabi Safa, N. (2016) Information security policy compliance model in organizations. Computers & Security, 56 (1). pp. 70-82. ISSN 0167-4048, DOI https://doi.org/10.1016/j.cose.2015.10.006.

This list was generated on Sat May 25 01:39:22 2024 +08.