Open Save New
FeedNavigator / National Library of Health Sciences
 
  
Computer Science
AddActa Automatica Sinica
AddAd hoc networks
AddAdvanced engineering informatics
AddAdvanced robotics
AddAnalog integrated circuits and signal processing
AddAnnals of telecommunications - Annales des télécommunications
AddAnnual reviews in control
AddApplied soft computing
AddAutomatica
AddAutomation and remote control
AddAutomation in construction
AddAutonomous robots
AddBioData Mining
AddBioinformatics (journal)
AddBiomedical Digital Libraries
AddBMC Bioinformatics
AddBMC Medical Informatics and Decision Making
AddBriefings in Bioinformatics
AddCentral European journal of operations research
AddCIN: Computers, Informatics, Nursing
AddCluster computing
AddCognitive systems research
AddComputational Intelligence
AddComputer animation and virtual worlds
AddComputer communications
AddComputer fraud and security
AddComputer languages, systems and structures
AddComputer Methods and Programs in Biomedicine
AddComputer networks
AddComputer speech and language
AddComputer vision and image understanding
AddComputerized Medical Imaging and Graphics
AddComputers in Biology and Medicine
AddComputing and visualization in science
AddConstraints
AddCybernetics and systems analysis
AddCyberpsychology & behavior
AddDesign automation for embedded systems
AddDigital Creativity
AddDiscrete event dynamic systems
AddDisplays
AddDynamical systems
AddEDPACS
AddElectronic Commerce Research
AddEngineering applications of artificial intelligence
AddEURASIP Journal on Advances in Signal Processing
AddEURASIP Journal on Bioinformatics and Systems Biology
AddEURASIP Journal on Embedded Systems
AddEURASIP Journal on Image and Video Processing
AddEURASIP Journal on wireless communications and networking
AddEuropean journal of control
AddExpert systems with applications
AddHuman-computer interaction
AddIEEE/ACM Transactions on Computational Biology and Bioinformatics
AddImage and vision computing
AddInformatics for Health and Social Care
AddInformatics In Primary Care
AddInformation & management
AddInformation and Communications Technology Law
AddInformation and computation
AddInformation and software technology
AddInformation systems and e-business management
AddInformation Systems Frontiers
AddInformation Systems Research
AddIntelligent service robotics
AddInternational Journal of Automation and computing
AddInternational journal of computer vision
AddInternational Journal of Control, Automation and Systems
AddInternational Journal of Critical Infrastructure Protection
AddInternational journal of general systems
AddInternational journal of human-computer studies
AddInternational journal of network management
AddInternational journal of wireless information networks
AddInternational journal on document analysis and recognition (IJDAR)
AddJournal of Biomedical Informatics
AddJournal of Chemical Information and Modeling
AddJournal of computational electronics
AddJournal of Computational Science
AddJournal of Computer Virology and Hacking Techniques
AddJournal of Computer-Aided Molecular Design
AddJournal of computer-mediated communication
AddJournal of Decision Systems
AddJournal of Field Robotics
AddJournal of Graphics Tools
AddJournal of Grid Computing
AddJournal of Information Technology Case and Application Research
AddJournal of intelligent & robotic systems
AddJournal of Intelligent Manufacturing
AddJournal of Internet commerce
AddJournal of Logic and Computation
AddJournal of management information systems
AddJournal of Medical Internet Research
AddJournal of network and computer applications
AddJournal of network and systems management
AddJournal of process control
AddJournal of Signal Processing Systems
AddJournal of systems architecture
AddJournal of Systems Science and Systems Engineering
AddJournal of the American Medical Informatics Association
AddJournal of Zhejiang University Science C
AddLecture Notes in Computer Science
AddLiterary and Linguistic Computing
AddMachine vision and applications
AddMedical & Biological Engineering & Computing
AddMicrosystem technologies
AddMobile Networks and Applications
AddMultidimensional systems and signal processing
AddNano communication networks
AddNatural computing
AddNetnomics
AddNetwork security
AddNetworks and spatial economics
AddNeural computing & applications
AddNew generation computing
AddNew review of information networking
AddOptical switching and networking
AddPattern Analysis and Applications, PAA
AddPattern recognition
AddPattern recognition letters
AddPersonal and Ubiquitous Computing
AddPervasive and mobile computing
AddPLoS Computational Biology
AddPLoS Computational Biology Related SciVees
AddQuantum information processing
AddRobotics and autonomous systems
AddSciTopics Computer Science
AddSignal processing
AddSignal processing. Image communication
AddSimulation Modelling Practice and Theory
AddSource Code for Biology and Medicine
AddStudies in Health Technology and Informatics
AddSustainable Computing: Informatics and Systems
AddSystems & control letters
AddSystems Research and Behavioral Science
AddTelecommunications policy
AddTelematics and informatics
AddThe Journal of Strategic Information Systems
AddUser Modeling and User-Adapted Interaction
AddWeb Semantics: Science, Services and Agents on the World Wide Web
AddWireless communications and mobile computing
AddWireless networks
AddWorld wide web


»My Articles

»Latest Feeds

»Popular Feeds
Search Feed Catalog by Name:
EventsComputer fraud and security2 dayssaveRefWorksSFX Info
The post-Covid risk of hybrid workplacesComputer fraud and security2 dayssaveRefWorksSFX Info
Deconstructing the SolarWinds breachComputer fraud and security2 dayssaveRefWorksSFX Info
Learning from learning: detecting account takeovers by identifying forgetful usersComputer fraud and security2 dayssaveRefWorksSFX Info
Trustworthy digital infrastructure for identity systems: why should privacy matter to security engineers?Computer fraud and security2 dayssaveRefWorksSFX Info
In briefComputer fraud and security2 dayssaveRefWorksSFX Info
Verizon: 2021 Data Breach Investigations ReportComputer fraud and security2 dayssaveRefWorksSFX Info
Fraud money interceptedComputer fraud and security2 dayssaveRefWorksSFX Info
EditorialComputer fraud and security2 dayssaveRefWorksSFX Info
Attack on meat-packing firm provokes White House responseComputer fraud and security2 dayssaveRefWorksSFX Info
EventsComputer fraud and security25 dayssaveRefWorksSFX Info
The dangers of the Microsoft Exchange Server vulnerabilitiesComputer fraud and security25 dayssaveRefWorksSFX Info
Are we losing the fight against cybercrime?Computer fraud and security25 dayssaveRefWorksSFX Info
Insider attacks: human-factors attacks and mitigationComputer fraud and security25 dayssaveRefWorksSFX Info
How to prepare for the onslaught of phishing email attacksComputer fraud and security25 dayssaveRefWorksSFX Info
SIM boxing – why mobile regulators need to act nowComputer fraud and security25 dayssaveRefWorksSFX Info
The practical difference between known and unknown threatsComputer fraud and security25 dayssaveRefWorksSFX Info
In briefComputer fraud and security25 dayssaveRefWorksSFX Info
Hiscox Cyber Readiness Report 2021Computer fraud and security25 dayssaveRefWorksSFX Info
Emotet deletedComputer fraud and security25 dayssaveRefWorksSFX Info
EditorialComputer fraud and security25 dayssaveRefWorksSFX Info
Ransomware taskforce launched while attackers score successes against major targetsComputer fraud and security25 dayssaveRefWorksSFX Info
EventsComputer fraud and security53 dayssaveRefWorksSFX Info
Mitigating the risks of fileless attacksComputer fraud and security53 dayssaveRefWorksSFX Info
Moving from employee compliance to employee success in the cyber security domainComputer fraud and security53 dayssaveRefWorksSFX Info
Prioritising risk for better efficiency and collaborationComputer fraud and security53 dayssaveRefWorksSFX Info
Governance: the key driver for data-driven innovationComputer fraud and security53 dayssaveRefWorksSFX Info
What is DOM XSS and why should you care?Computer fraud and security53 dayssaveRefWorksSFX Info
In briefComputer fraud and security53 dayssaveRefWorksSFX Info
FBI: Internet Crime Report 2020Computer fraud and security53 dayssaveRefWorksSFX Info
Acer hit by record ransomComputer fraud and security53 dayssaveRefWorksSFX Info
EditorialComputer fraud and security53 dayssaveRefWorksSFX Info
UK Government lays out plans for cyber dominanceComputer fraud and security53 dayssaveRefWorksSFX Info
EventsComputer fraud and security53 dayssaveRefWorksSFX Info
The operation-centric strategyComputer fraud and security53 dayssaveRefWorksSFX Info
Cyberthreats are going mobile and it's time to take actionComputer fraud and security53 dayssaveRefWorksSFX Info
Maximising protection in an era of remote workingComputer fraud and security53 dayssaveRefWorksSFX Info
How a humanities background provides real value in cyber securityComputer fraud and security53 dayssaveRefWorksSFX Info
Defending against insider threats with network security's eighth layerComputer fraud and security53 dayssaveRefWorksSFX Info
Can't find that perfect gift? Blame the botsComputer fraud and security53 dayssaveRefWorksSFX Info
In briefComputer fraud and security53 dayssaveRefWorksSFX Info
RUSI: The UK's Response to Cyber FraudComputer fraud and security53 dayssaveRefWorksSFX Info
Supply chain attack hits airlinesComputer fraud and security53 dayssaveRefWorksSFX Info
EditorialComputer fraud and security53 dayssaveRefWorksSFX Info
Hundreds of thousands of firms at risk from Exchange bugsComputer fraud and security53 dayssaveRefWorksSFX Info
EventsComputer fraud and security152 dayssaveRefWorksSFX Info
How 2020 will shape the year aheadComputer fraud and security152 dayssaveRefWorksSFX Info
Cyber incident response and planning: a flexible approachComputer fraud and security152 dayssaveRefWorksSFX Info
Europe's ambition for digital sovereignty must not undermine the Internet's valuesComputer fraud and security152 dayssaveRefWorksSFX Info
Simplifying security: how to navigate the integration challengeComputer fraud and security152 dayssaveRefWorksSFX Info
 XML / RSS feed
report
next »