Open
Save
New
Save your settings as
After saving, you can use the same settings and home page with other computers or mobile phones. You can also restore settings if you have erased your cookies. Name has to be hard to guess and it must be at least 4 characters long and contain only letters and numbers. Please write it down!
Open your settings named
Author
Title
Abstract
Home
Health Sciences
Medicine
Nursing
Veterinary
Dentistry
Health Professions
Multidisciplinary
Life Sciences
Agricultural and Biological Sciences
Biochemistry, Genetics and Molecular Biology
Immunology and Microbiology
Neuroscience
Pharmacology, Toxicology and Pharmaceutics
Multidisciplinary
Physical Sciences
Chemical Engineering
Chemistry
Computer Science
Earth and Planetary Sciences
Energy
Engineering
Environmental Science
Mathematics
Materials Science
Physics and Astronomy
Multidisciplinary
Social Sciences
Business, Management and Accounting
Decision Sciences
Economics, Econometrics and Finance
Education
Law
Library and Information Science
Psychology
Social Sciences
Multidisciplinary
Humanities
Arts
History and Cultural Studies
Linguistics
Literary Studies
Philosophy
Theology and Religion
Multidisciplinary
Suomi
Uutiset
Blogit
Kirjastot.fi
Helsingin yliopisto
Tutkijat / Helsinki (Lääketiede)
Tutkijat / Kuopio (Lääketiede)
Tutkijat / Oulu (Lääketiede)
Tutkijat / Tampere (Lääketiede)
Tutkijat / Turku (Lääketiede)
Tutkijat / Instituutiot (Lääketiede)
ABC
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Help
Computer Science
All
Journals
News
Blogs
Acta Automatica Sinica
Ad hoc networks
Advanced engineering informatics
Advanced robotics
Analog integrated circuits and signal processing
Annals of telecommunications - Annales des télécommunications
Annual reviews in control
Applied soft computing
Automatica
Automation and remote control
Automation in construction
Autonomous robots
BioData Mining
Bioinformatics (journal)
Biomedical Digital Libraries
BMC Bioinformatics
BMC Medical Informatics and Decision Making
Briefings in Bioinformatics
Central European journal of operations research
CIN: Computers, Informatics, Nursing
Cluster computing
Cognitive systems research
Computational Intelligence
Computer animation and virtual worlds
Computer communications
Computer fraud and security
Computer languages, systems and structures
Computer Methods and Programs in Biomedicine
Computer networks
Computer speech and language
Computer vision and image understanding
Computerized Medical Imaging and Graphics
Computers in Biology and Medicine
Computing and visualization in science
Constraints
Cybernetics and systems analysis
Cyberpsychology & behavior
Design automation for embedded systems
Digital Creativity
Discrete event dynamic systems
Displays
Dynamical systems
EDPACS
Electronic Commerce Research
Engineering applications of artificial intelligence
EURASIP Journal on Advances in Signal Processing
EURASIP Journal on Bioinformatics and Systems Biology
EURASIP Journal on Embedded Systems
EURASIP Journal on Image and Video Processing
EURASIP Journal on wireless communications and networking
European journal of control
Expert systems with applications
Human-computer interaction
IEEE/ACM Transactions on Computational Biology and Bioinformatics
Image and vision computing
Informatics for Health and Social Care
Informatics In Primary Care
Information & management
Information and Communications Technology Law
Information and computation
Information and software technology
Information systems and e-business management
Information Systems Frontiers
Information Systems Research
Intelligent service robotics
International Journal of Automation and computing
International journal of computer vision
International Journal of Control, Automation and Systems
International Journal of Critical Infrastructure Protection
International journal of general systems
International journal of human-computer studies
International journal of network management
International journal of wireless information networks
International journal on document analysis and recognition (IJDAR)
Journal of Biomedical Informatics
Journal of Chemical Information and Modeling
Journal of computational electronics
Journal of Computational Science
Journal of Computer Virology and Hacking Techniques
Journal of Computer-Aided Molecular Design
Journal of computer-mediated communication
Journal of Decision Systems
Journal of Field Robotics
Journal of Graphics Tools
Journal of Grid Computing
Journal of Information Technology Case and Application Research
Journal of intelligent & robotic systems
Journal of Intelligent Manufacturing
Journal of Internet commerce
Journal of Logic and Computation
Journal of management information systems
Journal of Medical Internet Research
Journal of network and computer applications
Journal of network and systems management
Journal of process control
Journal of Signal Processing Systems
Journal of systems architecture
Journal of Systems Science and Systems Engineering
Journal of the American Medical Informatics Association
Journal of Zhejiang University Science C
Lecture Notes in Computer Science
Literary and Linguistic Computing
Machine vision and applications
Medical & Biological Engineering & Computing
Microsystem technologies
Mobile Networks and Applications
Multidimensional systems and signal processing
Nano communication networks
Natural computing
Netnomics
Network security
Networks and spatial economics
Neural computing & applications
New generation computing
New review of information networking
Optical switching and networking
Pattern Analysis and Applications, PAA
Pattern recognition
Pattern recognition letters
Personal and Ubiquitous Computing
Pervasive and mobile computing
PLoS Computational Biology
PLoS Computational Biology Related SciVees
Quantum information processing
Robotics and autonomous systems
SciTopics Computer Science
Signal processing
Signal processing. Image communication
Simulation Modelling Practice and Theory
Source Code for Biology and Medicine
Studies in Health Technology and Informatics
Sustainable Computing: Informatics and Systems
Systems & control letters
Systems Research and Behavioral Science
Telecommunications policy
Telematics and informatics
The Journal of Strategic Information Systems
User Modeling and User-Adapted Interaction
Web Semantics: Science, Services and Agents on the World Wide Web
Wireless communications and mobile computing
Wireless networks
World wide web
»My Articles
»Latest Feeds
»Popular Feeds
Search Feed Catalog by Name:
Accessibility
©
Terkko 2005-2021
Events calendar
Network security
18 days
save
Learning from the past
Network security
18 days
save
Locking the door: tackling credential abuse
Network security
18 days
save
Looking to the future of the cyber security landscape
Network security
18 days
save
Investigating cyber attacks using domain and DNS data
Network security
18 days
save
In brief
Network security
18 days
save
IBM: 2021 X-Force Threat Intelligence Index
Network security
18 days
save
Threatwatch
Network security
18 days
save
North Korea targets defence firms and Pfizer
Network security
18 days
save
Accellion vulnerabilities lead to breaches of major organisations
Network security
18 days
save
Due to the Covid-19 pandemic, many conferences are being cancelled, postponed or converted into virtual events. The events listed here were still planned to proceed at the time of publication.
Network security
45 days
save
Credential stuffing – the new hack
Network security
45 days
save
Avoiding costly downtime – how MSPs can manage their networks
Network security
45 days
save
The state of zero trust in the age of fluid working
Network security
45 days
save
Who's that knocking at the door? The problem of credential abuse
Network security
45 days
save
In brief
Network security
45 days
save
Veracode: State of Software Security v11
Network security
45 days
save
Threatwatch
Network security
45 days
save
More fallout from SolarWinds hack
Network security
45 days
save
Florida facility hacked in attempt to poison water
Network security
45 days
save
Events calendar
Network security
79 days
save
Power and security in a common mission
Network security
79 days
save
Now is the time to move past traditional 3-2-1 back-ups
Network security
79 days
save
Shining a light on UEFI – the hidden memory space being exploited in attacks
Network security
79 days
save
The event data management problem: getting the most from network detection and response
Network security
79 days
save
Relying on firewalls? Here's why you'll be hacked
Network security
79 days
save
How can mobile networks protect critical infrastructure?
Network security
79 days
save
In brief
Network security
79 days
save
Hacking Multifactor Authentication
Network security
79 days
save
The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
Network security
79 days
save
Threatwatch
Network security
79 days
save
SolarWinds supply chain breach threatens government agencies and enterprises worldwide
Network security
79 days
save
Events calendar
Network security
109 days
save
Securing Windows networks against WSUS attacks
Network security
109 days
save
Where conventional security control validation falls short when evaluating organisational threats
Network security
109 days
save
Nation-state attacks: the escalating menace
Network security
109 days
save
When it comes to cyber security, ignorance isn't bliss – it's negligence
Network security
109 days
save
How SASE is defining the future of network security
Network security
109 days
save
In brief
Network security
109 days
save
Synopsys: DevSecOps practices and open-source management in 2020
Network security
109 days
save
Security firms breached
Network security
109 days
save
Threatwatch
Network security
109 days
save
UK reveals existence of its military cyber operations unit
Network security
109 days
save
Events calendar
Network security
140 days
save
How to nudge in cyber security
Network security
140 days
save
Digital identities – self-sovereignty and blockchain are the keys to success
Network security
140 days
save
How DIY PKI often negates the promise of public key encryption
Network security
140 days
save
The future of 5G smart home network security is micro-segmentation
Network security
140 days
save
Bot mitigation – how gapsin understanding and ownership are exposingbusinesses to greater threats
Network security
140 days
save
Can graphs mitigate against coronavirus-related cybercrime?
Network security
140 days
save
report
next »