Open Save New
FeedNavigator / National Library of Health Sciences
Computer Science
AddActa Automatica Sinica
AddAd hoc networks
AddAdvanced engineering informatics
AddAdvanced robotics
AddAll Things Digital - News
AddAmazon Web Services Blog
AddAnalog integrated circuits and signal processing
AddAnnals of telecommunications - Annales des télécommunications
AddAnnual reviews in control
AddApplied soft computing
AddAutomation and remote control
AddAutomation in construction
AddAutonomous robots
AddBioData Mining
AddBioinformatics (journal)
AddBiomedical Digital Libraries
AddBlown to Bits
AddBMC Bioinformatics
AddBMC Medical Informatics and Decision Making
AddBriefings in Bioinformatics
AddCCC Computing Research Highlights
AddCentral European journal of operations research
AddCIN: Computers, Informatics, Nursing
AddClass M
AddCluster computing
AddCognitive systems research
AddComputational Intelligence
AddComputer animation and virtual worlds
AddComputer communications
AddComputer fraud and security
AddComputer languages, systems and structures
AddComputer Methods and Programs in Biomedicine
AddComputer networks
AddComputer Scientist in a Business School
AddComputer speech and language
AddComputer vision and image understanding
AddComputerized Medical Imaging and Graphics
AddComputers in Biology and Medicine
AddComputing and visualization in science
AddCybernetics and systems analysis
AddCyberpsychology & behavior
AddDaniel Lemire's blog
AddDesign automation for embedded systems
AddDigital Creativity
AddDigital Science Blog
AddDiscrete event dynamic systems
AddDynamical systems
AddElectronic Commerce Research
AddEngineering applications of artificial intelligence
AddEURASIP Journal on Advances in Signal Processing
AddEURASIP Journal on Bioinformatics and Systems Biology
AddEURASIP Journal on Embedded Systems
AddEURASIP Journal on Image and Video Processing
AddEURASIP Journal on wireless communications and networking
AddEuropean journal of control
AddExpert systems with applications
AddGeekWire Informatics Iron
AddHuman-computer interaction
AddIEEE/ACM Transactions on Computational Biology and Bioinformatics
AddImage and vision computing
AddInformatics for Health and Social Care
AddInformatics In Primary Care
AddInformation & management
AddInformation and Communications Technology Law
AddInformation and computation
AddInformation and software technology
AddInformation systems and e-business management
AddInformation Systems Frontiers
AddInformation Systems Research
AddInkling Engineering Blog
AddIntelligent service robotics
AddInternational Journal of Automation and computing
AddInternational journal of computer vision
AddInternational Journal of Control, Automation and Systems
AddInternational Journal of Critical Infrastructure Protection
AddInternational journal of general systems
AddInternational journal of human-computer studies
AddInternational journal of network management
AddInternational journal of wireless information networks
AddInternational journal on document analysis and recognition (IJDAR)
AddJoel on Software
AddJournal of Biomedical Informatics
AddJournal of Chemical Information and Modeling
AddJournal of computational electronics
AddJournal of Computational Science
AddJournal of Computer Virology and Hacking Techniques
AddJournal of Computer-Aided Molecular Design
AddJournal of computer-mediated communication
AddJournal of Decision Systems
AddJournal of Field Robotics
AddJournal of Graphics Tools
AddJournal of Grid Computing
AddJournal of Information Technology Case and Application Research
AddJournal of intelligent & robotic systems
AddJournal of Intelligent Manufacturing
AddJournal of Internet commerce
AddJournal of Logic and Computation
AddJournal of management information systems
AddJournal of Medical Internet Research
AddJournal of network and computer applications
AddJournal of network and systems management
AddJournal of process control
AddJournal of Signal Processing Systems
AddJournal of systems architecture
AddJournal of Systems Science and Systems Engineering
AddJournal of the American Medical Informatics Association
AddJournal of Zhejiang University Science C
AddLecture Notes in Computer Science
AddLiterary and Linguistic Computing
AddMachine vision and applications
AddMany Niches (Brendan Watson)
AddMedical & Biological Engineering & Computing
AddMicrosystem technologies
AddMIT : Computer science and technology
AddMobile Networks and Applications
AddMultidimensional systems and signal processing
AddNano communication networks
AddNatural computing
AddNetwork security
AddNetworks and spatial economics
AddNeural computing & applications
AddNew generation computing
AddNew review of information networking
AddO'Reilly Radar
AddOptical switching and networking
AddPattern Analysis and Applications, PAA
AddPattern recognition
AddPattern recognition letters
AddPersonal and Ubiquitous Computing
AddPervasive and mobile computing Computer Sciences
AddPLoS Computational Biology
AddPLoS Computational Biology Related SciVees
AddPLOS Tech
AddQuantum information processing
AddRobotics and autonomous systems
AddSciTopics Computer Science
AddSignal processing
AddSignal processing. Image communication
AddSimulation Modelling Practice and Theory
AddSource Code for Biology and Medicine
AddStudies in Health Technology and Informatics
AddSustainable Computing: Informatics and Systems
AddSystems & control letters
AddSystems Research and Behavioral Science
AddTechCrunch » google
AddTelecommunications policy
AddTelematics and informatics
AddThe Journal of Strategic Information Systems
AddUser Modeling and User-Adapted Interaction
AddWeb Semantics: Science, Services and Agents on the World Wide Web
AddWireless communications and mobile computing
AddWireless networks
AddWorld wide web

»My Articles

»Latest Feeds

»Popular Feeds
Search Feed Catalog by Name:

Events calendarNetwork security17 dayssaveRefWorksSFX Info
Should we scare people into behaving securely?Network security17 dayssaveRefWorksSFX Info
RPKI and the future of routing securityNetwork security17 dayssaveRefWorksSFX Info
Treading water: why organisations are making no progress on cyber securityNetwork security17 dayssaveRefWorksSFX Info
The importance of domains to security managementNetwork security17 dayssaveRefWorksSFX Info
Office walls and roadblocks: how workflows and terminology get in the way of visibilityNetwork security17 dayssaveRefWorksSFX Info
How contact centres can leave businesses exposed to cybercrimeNetwork security17 dayssaveRefWorksSFX Info
In briefNetwork security17 dayssaveRefWorksSFX Info
NCSC Annual Review 2019Network security17 dayssaveRefWorksSFX Info
ThreatwatchNetwork security17 dayssaveRefWorksSFX Info
Child exploitation site is shut downNetwork security17 dayssaveRefWorksSFX Info
Russians pose as Iranians to attack Middle East targetsNetwork security17 dayssaveRefWorksSFX Info
Events CalendarNetwork security51 dayssaveRefWorksSFX Info
Goodbye SIEM, hello SOARXNetwork security51 dayssaveRefWorksSFX Info
Cyber security attacks on robotic platformsNetwork security51 dayssaveRefWorksSFX Info
The state of operational technology securityNetwork security51 dayssaveRefWorksSFX Info
Protecting Industry 4.0: challenges and solutions as IT, OT and IP convergeNetwork security51 dayssaveRefWorksSFX Info
In briefNetwork security51 dayssaveRefWorksSFX Info
Bitdefender: Hacked Off!Network security51 dayssaveRefWorksSFX Info
Loss of confidence among compliance professionalsNetwork security51 dayssaveRefWorksSFX Info
ThreatwatchNetwork security51 dayssaveRefWorksSFX Info
FDA issues medical device warningNetwork security51 dayssaveRefWorksSFX Info
US looks to tighten aircraft securityNetwork security51 dayssaveRefWorksSFX Info
NCSC warns UK universities of cyberthreatsNetwork security51 dayssaveRefWorksSFX Info
Events CalendarNetwork security77 dayssaveRefWorksSFX Info
The ideal industrial SOCNetwork security77 dayssaveRefWorksSFX Info
Cloud security: how to protect critical data and stay productiveNetwork security77 dayssaveRefWorksSFX Info
Why do PAM projects fail?Network security77 dayssaveRefWorksSFX Info
Best practices for fighting the fileless threatNetwork security77 dayssaveRefWorksSFX Info
The many ways to hack 2FANetwork security77 dayssaveRefWorksSFX Info
Automated systems only: why CISOs should switch off their dumb machinesNetwork security77 dayssaveRefWorksSFX Info
In briefNetwork security77 dayssaveRefWorksSFX Info
Kaspersky: The State of Industrial Cyber securityNetwork security77 dayssaveRefWorksSFX Info
Cybercrime groups working togetherNetwork security77 dayssaveRefWorksSFX Info
ThreatwatchNetwork security77 dayssaveRefWorksSFX Info
Dramatic rise in data breaches, with Yves Rocher, Monster and ECB among latest to be hitNetwork security77 dayssaveRefWorksSFX Info
Events calendarNetwork security109 dayssaveRefWorksSFX Info
Response in the cloudNetwork security109 dayssaveRefWorksSFX Info
Decrypting SSL traffic: best practices for security, compliance and productivityNetwork security109 dayssaveRefWorksSFX Info
Demystifying the role of AI for better network securityNetwork security109 dayssaveRefWorksSFX Info
Securing the future of AgTechNetwork security109 dayssaveRefWorksSFX Info
Achieving IoT nirvana by protecting cellular networksNetwork security109 dayssaveRefWorksSFX Info
It's a war out there: why malicious hackers are beating businesses to the punch – and what we can do about itNetwork security109 dayssaveRefWorksSFX Info
In briefNetwork security109 dayssaveRefWorksSFX Info
NCSC: Active Cyber Defence (ACD) – The Second YearNetwork security109 dayssaveRefWorksSFX Info
Vulnerable PCsNetwork security109 dayssaveRefWorksSFX Info
ThreatwatchNetwork security109 dayssaveRefWorksSFX Info
More data breaches compromise millions of recordsNetwork security109 dayssaveRefWorksSFX Info
Events CalendarNetwork security140 dayssaveRefWorksSFX Info
Why you need Cyber EssentialsNetwork security140 dayssaveRefWorksSFX Info
 XML / RSS feed
next »