Prey-Predator Model for Countering Internet- assisted Radicalization and Recruitment
|
2020 |
Adhikari, Naresh |
Resilient Cybersecurity Architecture
|
2020 |
AlHamdani, Wasim A. |
Cyber Alliances and Proxy Cyber Warfare
|
2020 |
Barbosa, Jorge |
Scalable Verification of NP Problems in Blockchain
|
2020 |
Bushra, Naila |
The Strategy of Persistent Engagement: From Single Domain to Cross-Domains
|
2020 |
Chen, Jim Q. |
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot Study
|
2020 |
Flack, Nathaniel |
An Analysis of Connected Cars Technology and Security
|
2020 |
Ghafarian, Ahmad |
Anticipatory Ethics for Vulnerability Disclosure
|
2020 |
Huskaj, Gazmend |
Digital Forensic Readiness Framework for Software- Defined Networks Using a Trigger-Based Collection Mechanism
|
2020 |
Lagrasse, Maxime |
Enhanced Channel-PUFs: The Advantages of Artificial Intelligence for Channel Estimation
|
2020 |
Lipps, Christoph |
Who Hath Measured the (Proving) Ground: Variation in Offensive Capabilities Test and Evaluation
|
2020 |
Work, J. D. |
A Method for Teaching Open Source Intelligence (OSINT) Using Personalised Cloud-based Exercises
|
2020 |
Yari, Saber |
An Anticipatory Ethical Analysis of Offensive Cyberspace Operations
|
2020 |
Huskaj, Gazmend |
A Review of Security System Assessment Tools Suitable for eHealth in Namibia
|
2020 |
Gerson, Naemi |
An Analysis of Social Networking Threats
|
2020 |
Kahimise, Jennyphar |
A Defined Digital Forensic Criteria for Cybercrime Reporting
|
2020 |
Baror, Stacey Omeleze |
An Examination in Social Engineering: The Susceptibility of Disclosing Private Security Information in College Students
|
2020 |
Bleiman, Rachel |
Electronic Healthcare Record and Cyber Security Threats: A Development of an Agile Framework
|
2020 |
Bouazzaoui, Sarah |
A Warfare Domain Approach to the Disinformation Problem
|
2020 |
Canan, Mustafa |
Fingerprinting Vehicles With CAN Bus Data Samples
|
2020 |
Crow, David R. |