Security of Systems on Chip

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ECCWS (19. : 2020 : Online) 19th European Conference on Cyber Warfare and Security (ECCWS 2020)
1. Verfasser: Tumer, Eda (VerfasserIn)
Weitere Verfasser: Maglaras, Leandros (VerfasserIn)
Pages:19
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Online Fraud & Money Laundry in E-Commerce 2020 Alsaibai, Hasan
Detecting a Rogue Switch using Network Automation 2020 Bhuse, Vijay
Analysis of Reports on Cyber Threats Attacks Using Text-Analytical Software 2020 Burita, Ladislav
Water Distribution Network Leak Detection Management 2020 Coning, Arno de
The Weapons of Choice: Terrorist Armament Culture and the Use of Firearms in Online Propaganda and Identitv-Building through Cyberspace 2020 Haberl, Ferdinand J.
Strengthening the Cybersecurity of Smart Grids: The Role of Artificial Intelligence in Resiliency of Substation Intelligent Electronic Devices 2020 Iftimie, lon A.
Online Polarization, Radicalization and Conspiracy 2020 Jääskeläinen, Petri
Finnish View on the Combat Functions in the Cyber Domain 2020 Kiviharju, Mikko
Cyber Security Capacity Building: Cyber Security Education in Finnish Universities 2020 Lehto, Martti
Actors in Society’s Hybrid information Environment: Grounded Theory Analvsis and 2020 Mustonen-Ollila, Erja
Towards a Methodology for the Classification of loT Devices 2020 Sarris, Dimitrios
Artificial Intelligence and its' Legal Risk to Cybersecurity 2020 Watney, M. M.
Smart City loT: Co-Designing Trustworthy Public Safety Drones for Indoor Flight Missions 2020 Wingo, Harry
Applications of Epidemiology to Cybersecurity 2020 Modini, Jessemyn
Comparing Personality Traits Between Penetration Tester, Information Security and its Professionals from Two Cohorts 2020 Opedal, Olav
Using Ethereum Smart Contracts for Botnet Command and Control 2020 Oliveira, Alexandre
Cyber as a Hybrid Threat to NATO's Operational Energy Security 2020 Dupuy, Arnold
An Ontology for Cyber ISTAR in Offensive Cyber Operations 2020 Grant, Tim
What LEGAD needs to know? Analysis of AARs from Locked Shields (2012-2018) 2020 Harašta, Jakub
Usefulness of Cyber Attribution Indicators 2020 Karlzén, Henrik
Alle Artikel auflisten