Cyber as a Hybrid Threat to NATO's Operational Energy Security
|
2020 |
Dupuy, Arnold |
An Ontology for Cyber ISTAR in Offensive Cyber Operations
|
2020 |
Grant, Tim |
What LEGAD needs to know? Analysis of AARs from Locked Shields (2012-2018)
|
2020 |
Harašta, Jakub |
Usefulness of Cyber Attribution Indicators
|
2020 |
Karlzén, Henrik |
Cyber Wargaming on the Technical/Tactical Level: The Cyber Resilience Card Game (CRCG)
|
2020 |
Kodalle, Thorsten |
Towards Cyber Sensing: Venturing Beyond Traditional Security Events
|
2020 |
Lavrenovs, Artürs |
How to Secure the Communication and Authentication in the lloT: A SRAM-based Hybrid Cryptosystem
|
2020 |
Lipps, Christoph |
Blockchain Based Voting Systems
|
2020 |
Soni, Yash |
Fault Tolerance: An Approach Toward a Hybrid Fault Tolerance Framework Within a Distributed Computer Architecture
|
2020 |
O'Flaherty, Christopher |
Cyber Security: Trust Based Architecture in the Management of an Organization's Security
|
2020 |
Pöyhönen, Jouni |
Cybersecurity Awareness in an Industrial Control Systems Company
|
2020 |
Prins, Stefan |
Signing Your Name Away: An Overview on the Risks of Electronic Signatures
|
2020 |
Solms, Suné von |
The Evolution of Ransomware Variants
|
2020 |
Wood, Ashley Charles |
Cyberattacks and the Prohibition of the Use of Force under Humanitarian Law with Reference to the Tallinn Manual
|
2020 |
Akbariavaz, Khalil |
Mitigating Insider Threats: A Case Study of Data Leak Prevention
|
2020 |
Mohd, Nurul |
On the Security of the EMV Authentication Methods of Contactless Cards
|
2020 |
Al-Maliki, Ossama |
Cyber Humanity in Cyber War
|
2020 |
Barbosa, Jorge |
Information Sharing in Cyber Defence Exercises
|
2020 |
Brilingaité, Agné |
Cyber Crisis Management and Leadership
|
2020 |
Danet, Didier |
Cyber Counterintelligence: Some Contours towards the Academic Research Agenda
|
2020 |
Duvenage, Petrus |