Open
Save
New
Save your settings as
After saving, you can use the same settings and home page with other computers or mobile phones. You can also restore settings if you have erased your cookies. Name has to be hard to guess and it must be at least 4 characters long and contain only letters and numbers. Please write it down!
Open your settings named
Author
Title
Abstract
Home
Health Sciences
Medicine
Nursing
Veterinary
Dentistry
Health Professions
Multidisciplinary
Life Sciences
Agricultural and Biological Sciences
Biochemistry, Genetics and Molecular Biology
Immunology and Microbiology
Neuroscience
Pharmacology, Toxicology and Pharmaceutics
Multidisciplinary
Physical Sciences
Chemical Engineering
Chemistry
Computer Science
Earth and Planetary Sciences
Energy
Engineering
Environmental Science
Mathematics
Materials Science
Physics and Astronomy
Multidisciplinary
Social Sciences
Business, Management and Accounting
Decision Sciences
Economics, Econometrics and Finance
Education
Law
Library and Information Science
Psychology
Social Sciences
Multidisciplinary
Humanities
Arts
History and Cultural Studies
Linguistics
Literary Studies
Philosophy
Theology and Religion
Multidisciplinary
Suomi
Uutiset
Blogit
Kirjastot.fi
Helsingin yliopisto
Tutkijat / Helsinki (Lääketiede)
Tutkijat / Kuopio (Lääketiede)
Tutkijat / Oulu (Lääketiede)
Tutkijat / Tampere (Lääketiede)
Tutkijat / Turku (Lääketiede)
Tutkijat / Instituutiot (Lääketiede)
ABC
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Help
Computer Science
All
Journals
News
Blogs
Acta Automatica Sinica
Ad hoc networks
Advanced engineering informatics
Advanced robotics
All Things Digital - News
Amazon Web Services Blog
Analog integrated circuits and signal processing
Annals of telecommunications - Annales des télécommunications
Annual reviews in control
Applied soft computing
Automatica
Automation and remote control
Automation in construction
Autonomous robots
BioData Mining
Bioinformatics (journal)
Biomedical Digital Libraries
Blown to Bits
BMC Bioinformatics
BMC Medical Informatics and Decision Making
Briefings in Bioinformatics
CCC
CCC Computing Research Highlights
Central European journal of operations research
CIN: Computers, Informatics, Nursing
Class M
Cluster computing
Cognitive systems research
Computational Intelligence
Computer animation and virtual worlds
Computer communications
Computer fraud and security
Computer languages, systems and structures
Computer Methods and Programs in Biomedicine
Computer networks
Computer Scientist in a Business School
Computer speech and language
Computer vision and image understanding
Computerized Medical Imaging and Graphics
Computers in Biology and Medicine
Computing and visualization in science
Constraints
Cybernetics and systems analysis
Cyberpsychology & behavior
Daniel Lemire's blog
Design automation for embedded systems
Digital Creativity
Digital Science Blog
Discrete event dynamic systems
Displays
Dynamical systems
EDPACS
Electronic Commerce Research
Engineering applications of artificial intelligence
EURASIP Journal on Advances in Signal Processing
EURASIP Journal on Bioinformatics and Systems Biology
EURASIP Journal on Embedded Systems
EURASIP Journal on Image and Video Processing
EURASIP Journal on wireless communications and networking
European journal of control
Expert systems with applications
GeekWire
Genomeweb.com Informatics Iron
Human-computer interaction
IEEE/ACM Transactions on Computational Biology and Bioinformatics
Image and vision computing
Informatics for Health and Social Care
Informatics In Primary Care
Information & management
Information and Communications Technology Law
Information and computation
Information and software technology
Information systems and e-business management
Information Systems Frontiers
Information Systems Research
Inkling Engineering Blog
Intelligent service robotics
International Journal of Automation and computing
International journal of computer vision
International Journal of Control, Automation and Systems
International Journal of Critical Infrastructure Protection
International journal of general systems
International journal of human-computer studies
International journal of network management
International journal of wireless information networks
International journal on document analysis and recognition (IJDAR)
Joel on Software
Journal of Biomedical Informatics
Journal of Chemical Information and Modeling
Journal of computational electronics
Journal of Computational Science
Journal of Computer Virology and Hacking Techniques
Journal of Computer-Aided Molecular Design
Journal of computer-mediated communication
Journal of Decision Systems
Journal of Field Robotics
Journal of Graphics Tools
Journal of Grid Computing
Journal of Information Technology Case and Application Research
Journal of intelligent & robotic systems
Journal of Intelligent Manufacturing
Journal of Internet commerce
Journal of Logic and Computation
Journal of management information systems
Journal of Medical Internet Research
Journal of network and computer applications
Journal of network and systems management
Journal of process control
Journal of Signal Processing Systems
Journal of systems architecture
Journal of Systems Science and Systems Engineering
Journal of the American Medical Informatics Association
Journal of Zhejiang University Science C
Lecture Notes in Computer Science
Literary and Linguistic Computing
Machine vision and applications
Many Niches (Brendan Watson)
Mashable
Medical & Biological Engineering & Computing
Microsystem technologies
MIT : Computer science and technology
Mobile Networks and Applications
Multidimensional systems and signal processing
Nano communication networks
Natural computing
Netnomics
Network security
Networks and spatial economics
Neural computing & applications
New generation computing
New review of information networking
O'Reilly Radar
Optical switching and networking
Pattern Analysis and Applications, PAA
Pattern recognition
Pattern recognition letters
Personal and Ubiquitous Computing
Pervasive and mobile computing
PHYSorg.com: Computer Sciences
PLoS Computational Biology
PLoS Computational Biology Related SciVees
PLOS Tech
Quantum information processing
Robotics and autonomous systems
SciTopics Computer Science
Signal processing
Signal processing. Image communication
Simulation Modelling Practice and Theory
Source Code for Biology and Medicine
Studies in Health Technology and Informatics
Sustainable Computing: Informatics and Systems
Systems & control letters
Systems Research and Behavioral Science
TechCrunch » google
Telecommunications policy
Telematics and informatics
The Journal of Strategic Information Systems
User Modeling and User-Adapted Interaction
Web Semantics: Science, Services and Agents on the World Wide Web
Wireless communications and mobile computing
Wireless networks
World wide web
»My Articles
»Latest Feeds
»Popular Feeds
Search Feed Catalog by Name:
©
Terkko 2005-2019
Events calendar
Network security
17 days
save
Should we scare people into behaving securely?
Network security
17 days
save
RPKI and the future of routing security
Network security
17 days
save
Treading water: why organisations are making no progress on cyber security
Network security
17 days
save
The importance of domains to security management
Network security
17 days
save
Office walls and roadblocks: how workflows and terminology get in the way of visibility
Network security
17 days
save
How contact centres can leave businesses exposed to cybercrime
Network security
17 days
save
In brief
Network security
17 days
save
NCSC Annual Review 2019
Network security
17 days
save
Threatwatch
Network security
17 days
save
Child exploitation site is shut down
Network security
17 days
save
Russians pose as Iranians to attack Middle East targets
Network security
17 days
save
Events Calendar
Network security
51 days
save
Goodbye SIEM, hello SOARX
Network security
51 days
save
Cyber security attacks on robotic platforms
Network security
51 days
save
The state of operational technology security
Network security
51 days
save
Protecting Industry 4.0: challenges and solutions as IT, OT and IP converge
Network security
51 days
save
In brief
Network security
51 days
save
Bitdefender: Hacked Off!
Network security
51 days
save
Loss of confidence among compliance professionals
Network security
51 days
save
Threatwatch
Network security
51 days
save
FDA issues medical device warning
Network security
51 days
save
US looks to tighten aircraft security
Network security
51 days
save
NCSC warns UK universities of cyberthreats
Network security
51 days
save
Events Calendar
Network security
77 days
save
The ideal industrial SOC
Network security
77 days
save
Cloud security: how to protect critical data and stay productive
Network security
77 days
save
Why do PAM projects fail?
Network security
77 days
save
Best practices for fighting the fileless threat
Network security
77 days
save
The many ways to hack 2FA
Network security
77 days
save
Automated systems only: why CISOs should switch off their dumb machines
Network security
77 days
save
In brief
Network security
77 days
save
Kaspersky: The State of Industrial Cyber security
Network security
77 days
save
Cybercrime groups working together
Network security
77 days
save
Threatwatch
Network security
77 days
save
Dramatic rise in data breaches, with Yves Rocher, Monster and ECB among latest to be hit
Network security
77 days
save
Events calendar
Network security
109 days
save
Response in the cloud
Network security
109 days
save
Decrypting SSL traffic: best practices for security, compliance and productivity
Network security
109 days
save
Demystifying the role of AI for better network security
Network security
109 days
save
Securing the future of AgTech
Network security
109 days
save
Achieving IoT nirvana by protecting cellular networks
Network security
109 days
save
It's a war out there: why malicious hackers are beating businesses to the punch – and what we can do about it
Network security
109 days
save
In brief
Network security
109 days
save
NCSC: Active Cyber Defence (ACD) – The Second Year
Network security
109 days
save
Vulnerable PCs
Network security
109 days
save
Threatwatch
Network security
109 days
save
More data breaches compromise millions of records
Network security
109 days
save
Events Calendar
Network security
140 days
save
Why you need Cyber Essentials
Network security
140 days
save
report
next »