Prey-Predator Model for Countering Internet- assisted Radicalization and Recruitment
|
2020 |
Adhikari, Naresh |
Resilient Cybersecurity Architecture
|
2020 |
AlHamdani, Wasim A. |
Cyber Alliances and Proxy Cyber Warfare
|
2020 |
Barbosa, Jorge |
Scalable Verification of NP Problems in Blockchain
|
2020 |
Bushra, Naila |
The Strategy of Persistent Engagement: From Single Domain to Cross-Domains
|
2020 |
Chen, Jim Q. |
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot Study
|
2020 |
Flack, Nathaniel |
An Analysis of Connected Cars Technology and Security
|
2020 |
Ghafarian, Ahmad |
Anticipatory Ethics for Vulnerability Disclosure
|
2020 |
Huskaj, Gazmend |
Digital Forensic Readiness Framework for Software- Defined Networks Using a Trigger-Based Collection Mechanism
|
2020 |
Lagrasse, Maxime |
Enhanced Channel-PUFs: The Advantages of Artificial Intelligence for Channel Estimation
|
2020 |
Lipps, Christoph |
Who Hath Measured the (Proving) Ground: Variation in Offensive Capabilities Test and Evaluation
|
2020 |
Work, J. D. |
A Method for Teaching Open Source Intelligence (OSINT) Using Personalised Cloud-based Exercises
|
2020 |
Yari, Saber |
An Anticipatory Ethical Analysis of Offensive Cyberspace Operations
|
2020 |
Huskaj, Gazmend |
A Review of Security System Assessment Tools Suitable for eHealth in Namibia
|
2020 |
Gerson, Naemi |
An Analysis of Social Networking Threats
|
2020 |
Kahimise, Jennyphar |
A Defined Digital Forensic Criteria for Cybercrime Reporting
|
2020 |
Baror, Stacey Omeleze |
Blockchain-based Redistricting Evaluation Protocol
|
2020 |
Adhikari, Naresh |
Fake News and Deepfakes: A Dangerous Threat for 21st Century information Security
|
2020 |
Botha, Jonny |
Cyber Warfare: Can there be Small Cyber Military Powers?
|
2020 |
Barbosa, Jorge |
Mathematically Modelling Cyber-Attacks Utilizing Engineering Techniques
|
2020 |
Easttom, Chuck |