Journal: Network Security

Volume 2020, Issue 2

6 -- 8Cindy Blake. Reducing risk with end-to-end application security automation
8 -- 14Pranshu Bajpai, Richard J. Enbody. Dissecting .NET ransomware: key generation, encryption and operation
14 -- 19Akashdeep Bhardwaj, Sam Goundar. Keyloggers: silent cyber security weapons
20 -- 0Kate MacMillan. Signs of things to come?