of 1 /1
www.elsevier.com/locate/cose CONTENTS Cybercrime in the Digital Economy - Editorial D. Gritzalis and G. Tejay 1 Selecting a Cloud Service Provider in the age of cybercrime M. Ouedraogo and H. Mouratidis 3 Smart control of operational threats in control substations J. Lopez, C. Alcaraz and R. Roman 14 Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration X. (Robert) Luo, W. Zhang, S. Burd and A. Seazzu 28 A game theoretic defence framework against DoS/DDoS cyber attacks T. Spyridopoulos, G. Karanikas, T. Tryfonas and G. Oikonomou 39 Smartphone sensor data as digital evidence A. Mylonas, V. Meletiadis, L. Mitrou and D. Gritzalis 51 Assessing the genuineness of events in runtime monitoring of cyber systems T. Tsigkritis and G. Spanoudakis 76 From information security to cyber security R. von Solms and J. van Niekerk 97 Integrated digital forensic process model M. D. Kohn, M. M. Eloff and J. H. P. Eloff 103 Available online at www.sciencedirect.com ScienceDirect Volume 38, October 2013

Contents

  • Author
    dothuan

  • View
    213

  • Download
    0

Embed Size (px)

Text of Contents

Page 1: Contents

www.elsevier.com/locate/cose

CONTENTS

Cybercrime in the Digital Economy - EditorialD. Gritzalis and G. Tejay 1

Selecting a Cloud Service Provider in the age of cybercrimeM. Ouedraogo and H. Mouratidis 3

Smart control of operational threats in control substationsJ. Lopez, C. Alcaraz and R. Roman 14

Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an explorationX. (Robert) Luo, W. Zhang, S. Burd and A. Seazzu 28

A game theoretic defence framework against DoS/DDoS cyber attacksT. Spyridopoulos, G. Karanikas, T. Tryfonas and G. Oikonomou 39

Smartphone sensor data as digital evidenceA. Mylonas, V. Meletiadis, L. Mitrou and D. Gritzalis 51

Assessing the genuineness of events in runtime monitoring of cyber systemsT. Tsigkritis and G. Spanoudakis 76

From information security to cyber securityR. von Solms and J. van Niekerk 97

Integrated digital forensic process modelM. D. Kohn, M. M. Eloff and J. H. P. Eloff 103

Available online at www.sciencedirect.com

ScienceDirect

Volume 38, October 2013