Mind this Gap: Criminal hacking and the global cybersecurity skills shortage, a critical analysis S Cobb Virus Bulletin Conference, 1-8, 2016 | 47 | 2016 |
Establishing firewall policy S Cobb Southcon/96 Conference Record, 198-205, 1996 | 40 | 1996 |
ICSA firewall policy guide v2. 0 S Cobb NCSA Security White Paper Series, 1997 | 31 | 1997 |
Malware is called malicious for a reason: The risks of weaponizing code S Cobb, A Lee 2014 6th International Conference On Cyber Conflict (CyCon 2014), 71-84, 2014 | 26 | 2014 |
NCSA Guide to PC and LAN Security S Cobb DIANE Publishing Company, 1999 | 17 | 1999 |
Manual de seguridad para PC y redes locales S Cobb, JFB Barcena, AJB Aran McGraw-Hill, 1994 | 13 | 1994 |
RoT: Ransomware of Things S Cobb Trends, 2017 | 12 | 2017 |
The economics of spam S Cobb ePrivacy Group, http://www. spamhelp. org/articles/economics of spam. pdf, 2003 | 12 | 2003 |
Advancing Accurate and Objective Cybercrime Metrics S Cobb J. Nat'l Sec. L. & Pol'y 10, 605, 2019 | 11 | 2019 |
Security issues in internet commerce S Cobb Southcon/96 Conference Record, 186-191, 1996 | 10 | 1996 |
Using Quattro PRO S Cobb McGraw-Hill, Inc., 1990 | 10 | 1990 |
Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals S Cobb Retrieved November 15, 2015, 2015 | 7 | 2015 |
Internet firewalls. S Cobb Byte 20 (10), 179-180, 1995 | 7 | 1995 |
Cybersecurity trends 2019: Privacy and intrusion in the global village D Harley, L Myers, S Cobb, C Gutierrez Eset, 2019 | 5 | 2019 |
Sizing Cybercrime: Incidents and accidents, hints and allegations S Cobb Proceedings of the 25th Virus Bulletin International Conference, 2015 | 5 | 2015 |
Stuxnet, Flamer, Flame, Whatever Name: There’s just no good malware S Cobb Доступен на http://blog. eset. com/2012/06/03/stuxnet-flamer-flame-whatever …, 2012 | 5 | 2012 |
The flip side of the wireless explosion: Dealing with WAP-gap security risks S Cobb Webpage [online]. Serverworld: Sun Server Archives: Jan, 2001 | 5 | 2001 |
Network World S Cobb Framingham 14 (27), 53, 1997 | 5 | 1997 |
Denial of Service C Cobb, S Cobb Secure Computing, 58-60, 1997 | 5 | 1997 |
Penetrating computer systems and networks C Cobb, S Cobb, ME Kabay, T Crothers Computer Security Handbook, 15.1-15.42, 2012 | 4 | 2012 |