Content of Issue 11
DOI: 10.3217/jucs-025-11
|
Cyberattack Detection and Response |
J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec |
1394 |
Detection of Size Modulation Covert Channels Using Countermeasure Variation |
S. Wendzel, F. Link, D. Eller, W. Mazurczyk |
1396 |
Analysis of the Infection and the Injection Phases of the Telnet Botnets |
T. Bajtoš, P. Sokol, A. Gajdoš, K. Lučivjanská, T. Mézešová |
1417 |
Cyberattack Response Model for the Nuclear Regulator in Slovenia |
S. Tomažič, I. Bernik |
1437 |
Testing the Human Backdoor: Organizational Response to a Phishing Campaign |
A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik |
1458 |
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure |
H.I. Kure, S. Islam |
1478 |