researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Network Security
Home
Index
Info
Issue
Volume
2020
, Issue
10
6
--
10
Assaf Morag
.
Exploitable hosts used in cloud native cyber attacks
10
--
13
Nadav Erez
.
How threat actors abuse ICS-specific file types
13
--
17
Tom Hofmann
.
How organisations can ethically negotiate ransomware payments
17
--
19
Robert Meyers
.
Data highway and the digital transformation: arguments for secure, centralised log management
20
--
0
Colin Tankard
.
Remote working reset now required