Blockchain-based Redistricting Evaluation Protocol
|
2020 |
Adhikari, Naresh |
Fake News and Deepfakes: A Dangerous Threat for 21st Century information Security
|
2020 |
Botha, Jonny |
Cyber Warfare: Can there be Small Cyber Military Powers?
|
2020 |
Barbosa, Jorge |
Mathematically Modelling Cyber-Attacks Utilizing Engineering Techniques
|
2020 |
Easttom, Chuck |
Applying Systems Engineering Principles to Penetration Testing
|
2020 |
Easttom, Chuck |
Intelligent based Framework for Detection of Fake News in the Social Network Platforms
|
2020 |
Fasola, Olusanjo |
A Strategic Roadmap for Cybersecurity Capability Engineering across Different Environments
|
2020 |
Gcaza, Noluxolo |
Toward an Ambidextrous Framework for Offensive Cyberspace Operations: A Theory, Policy and Practice Perspective
|
2020 |
Huskaj, Gazmend |
A Fast Alert Correlation Method with Bayesian Feature Constraints
|
2020 |
Kim, Minchul |
Customers' Perception of Cybersecurity Threats Toward e-Banking Adoption and Retention: A Conceptual Study
|
2020 |
Jibril, Abdul Bashiru |
Crown in the Clouds: A Canadian Data Sovereignty Crisis
|
2020 |
Kushwaha, Neal |
Complex Network Analysis for Evaluating Effects of Asymmetry Established by Closed National Networks
|
2020 |
Nikkarila, Juha-Pekka |
Systemic Methodology for Cyber Offense and Defense
|
2020 |
Pinto, C. Ariel |
Career Development in Cyber Security: Bootcamp Training Programs
|
2020 |
Caliskan, Emin |
Rising to the Challenge of Insider Threats for Middle Powers
|
2020 |
Modini, Jessemyn |
Cybersecurity Knowledge Requirements for Strategic Level Decision Makers
|
2020 |
Garcia-Granados, Fernando |
Cyber Attack Grammars for Risk/Cost Analysis
|
2020 |
Patten, Terry |
Digital Forensic Readiness Framework for Smart Homes
|
2020 |
Philomin, Sebastien |
Prey-Predator Model for Countering Internet- assisted Radicalization and Recruitment
|
2020 |
Adhikari, Naresh |
Resilient Cybersecurity Architecture
|
2020 |
AlHamdani, Wasim A. |