Prey-Predator Model for Countering Internet- assisted Radicalization and Recruitment
|
2020 |
Adhikari, Naresh |
Resilient Cybersecurity Architecture
|
2020 |
AlHamdani, Wasim A. |
Cyber Alliances and Proxy Cyber Warfare
|
2020 |
Barbosa, Jorge |
Scalable Verification of NP Problems in Blockchain
|
2020 |
Bushra, Naila |
The Strategy of Persistent Engagement: From Single Domain to Cross-Domains
|
2020 |
Chen, Jim Q. |
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot Study
|
2020 |
Flack, Nathaniel |
An Analysis of Connected Cars Technology and Security
|
2020 |
Ghafarian, Ahmad |
Anticipatory Ethics for Vulnerability Disclosure
|
2020 |
Huskaj, Gazmend |
Digital Forensic Readiness Framework for Software- Defined Networks Using a Trigger-Based Collection Mechanism
|
2020 |
Lagrasse, Maxime |
Enhanced Channel-PUFs: The Advantages of Artificial Intelligence for Channel Estimation
|
2020 |
Lipps, Christoph |
Who Hath Measured the (Proving) Ground: Variation in Offensive Capabilities Test and Evaluation
|
2020 |
Work, J. D. |
A Method for Teaching Open Source Intelligence (OSINT) Using Personalised Cloud-based Exercises
|
2020 |
Yari, Saber |
An Anticipatory Ethical Analysis of Offensive Cyberspace Operations
|
2020 |
Huskaj, Gazmend |
A Review of Security System Assessment Tools Suitable for eHealth in Namibia
|
2020 |
Gerson, Naemi |
An Analysis of Social Networking Threats
|
2020 |
Kahimise, Jennyphar |
A Defined Digital Forensic Criteria for Cybercrime Reporting
|
2020 |
Baror, Stacey Omeleze |
A Layered Network Collapse Method in Cyber Terrorism
|
2020 |
Alhajjar, Elie |
Countering Disinformation Propaganda: Reverse Engineering the Experimental Implicit Learning Paradigm
|
2020 |
Canan, Mustafa |
From Simple Scoring Towards a Meaningful Interpretation of Learning in Cvbersecurity Exercises
|
2020 |
Ernits, Margus |
Connected Vehicle Security
|
2020 |
Francia, III Guillermo A. |