A Layered Network Collapse Method in Cyber Terrorism
|
2020 |
Alhajjar, Elie |
Countering Disinformation Propaganda: Reverse Engineering the Experimental Implicit Learning Paradigm
|
2020 |
Canan, Mustafa |
From Simple Scoring Towards a Meaningful Interpretation of Learning in Cvbersecurity Exercises
|
2020 |
Ernits, Margus |
Connected Vehicle Security
|
2020 |
Francia, III Guillermo A. |
Notre Dame Fire Conspiracism as Reflective of Russian Ideological Competition with the West
|
2020 |
Hotchkiss, Michael Bennett |
The Critical Need for Tool Validation before Using Malware Scanners in Digital Forensics
|
2020 |
Hughes, Nicolas |
The Use of Signals Intelligence in Offensive Cyberspace Operations: An Anticipatory Ethical Analysis
|
2020 |
Iftimie, lon A. |
Defending Forward: An Exploration through the Lens of Biocybersecurity
|
2020 |
Palmer, Xavier-Lewis |
Distributed Authority as a Guiding set of Principles for Transnational Cyber Security Governance
|
2020 |
Pontbriand, Karine |
Impact of Security and Trust as Factors that influence the Adoption and Use of Digital Technologies that Generate, Collect and Transmit User Data
|
2020 |
Nwaiwu, Fortune |
The New Role of the 'Next Generation' CFO
|
2020 |
Potter, Dorothy O. |
International Information Power and Foreign Malign Influence in Cyberspace
|
2020 |
Schafer, Joseph H. |
Modelling the Supply Chain: Trust but Verify in Complex Systems
|
2020 |
Sobb, Theresa |
NetFlow Based Framework for Identifying Anomalous End User Nodes
|
2020 |
Vaarandi, Risto |
Cyber Probability of Kill: The Effectiveness of Malware in a Heterogeneous Software Environment
|
2020 |
Webster, Brandon |
Beyond 2000: The Rise of Australian Cyber Warfare Capability
|
2020 |
Williams, Andrew |
National Cyber Threat Prevention Mechanism as a part of the E-EWS
|
2020 |
Simola, Jussi |
Alternate Coupling for Targeted Supply Chain Attacks
|
2020 |
Rohret, David M. |
An Examination in Social Engineering: The Susceptibility of Disclosing Private Security Information in College Students
|
2020 |
Bleiman, Rachel |
Electronic Healthcare Record and Cyber Security Threats: A Development of an Agile Framework
|
2020 |
Bouazzaoui, Sarah |