publication venue for
- USB-based attacks. 70:675-688. 2017
- A model of the information security investment decision-making process. 63:1-13. 2016
- Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. 48:246-266. 2015
- Implementing a database encryption solution, design and implementation issues. 44:33-50. 2014
- 10. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. 43:1-218. 2014
- Mobile malware detection through analysis of deviations in application network behavior. 43:1-18. 2014