Author
dothuan
View
213
Download
0
Embed Size (px)
www.elsevier.com/locate/cose
CONTENTS
Cybercrime in the Digital Economy - EditorialD. Gritzalis and G. Tejay 1
Selecting a Cloud Service Provider in the age of cybercrimeM. Ouedraogo and H. Mouratidis 3
Smart control of operational threats in control substationsJ. Lopez, C. Alcaraz and R. Roman 14
Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an explorationX. (Robert) Luo, W. Zhang, S. Burd and A. Seazzu 28
A game theoretic defence framework against DoS/DDoS cyber attacksT. Spyridopoulos, G. Karanikas, T. Tryfonas and G. Oikonomou 39
Smartphone sensor data as digital evidenceA. Mylonas, V. Meletiadis, L. Mitrou and D. Gritzalis 51
Assessing the genuineness of events in runtime monitoring of cyber systemsT. Tsigkritis and G. Spanoudakis 76
From information security to cyber securityR. von Solms and J. van Niekerk 97
Integrated digital forensic process modelM. D. Kohn, M. M. Eloff and J. H. P. Eloff 103
Available online at www.sciencedirect.com
ScienceDirect
Volume 38, October 2013