Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 25

Content of Issue 11
DOI: 10.3217/jucs-025-11
Cyberattack Detection and Response J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec 1394
Detection of Size Modulation Covert Channels Using Countermeasure Variation S. Wendzel, F. Link, D. Eller, W. Mazurczyk 1396
Analysis of the Infection and the Injection Phases of the Telnet Botnets T. Bajtoš, P. Sokol, A. Gajdoš, K. Lučivjanská, T. Mézešová 1417
Cyberattack Response Model for the Nuclear Regulator in Slovenia S. Tomažič, I. Bernik 1437
Testing the Human Backdoor: Organizational Response to a Phishing Campaign A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik 1458
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure H.I. Kure, S. Islam 1478