Online Fraud & Money Laundry in E-Commerce
|
2020 |
Alsaibai, Hasan |
Detecting a Rogue Switch using Network Automation
|
2020 |
Bhuse, Vijay |
Analysis of Reports on Cyber Threats Attacks Using Text-Analytical Software
|
2020 |
Burita, Ladislav |
Water Distribution Network Leak Detection Management
|
2020 |
Coning, Arno de |
The Weapons of Choice: Terrorist Armament Culture and the Use of Firearms in Online Propaganda and Identitv-Building through Cyberspace
|
2020 |
Haberl, Ferdinand J. |
Strengthening the Cybersecurity of Smart Grids: The Role of Artificial Intelligence in Resiliency of Substation Intelligent Electronic Devices
|
2020 |
Iftimie, lon A. |
Online Polarization, Radicalization and Conspiracy
|
2020 |
Jääskeläinen, Petri |
Finnish View on the Combat Functions in the Cyber Domain
|
2020 |
Kiviharju, Mikko |
Cyber Security Capacity Building: Cyber Security Education in Finnish Universities
|
2020 |
Lehto, Martti |
Actors in Society’s Hybrid information Environment: Grounded Theory Analvsis and
|
2020 |
Mustonen-Ollila, Erja |
Towards a Methodology for the Classification of loT Devices
|
2020 |
Sarris, Dimitrios |
Artificial Intelligence and its' Legal Risk to Cybersecurity
|
2020 |
Watney, M. M. |
Smart City loT: Co-Designing Trustworthy Public Safety Drones for Indoor Flight Missions
|
2020 |
Wingo, Harry |
Applications of Epidemiology to Cybersecurity
|
2020 |
Modini, Jessemyn |
Comparing Personality Traits Between Penetration Tester, Information Security and its Professionals from Two Cohorts
|
2020 |
Opedal, Olav |
Using Ethereum Smart Contracts for Botnet Command and Control
|
2020 |
Oliveira, Alexandre |
Cyber as a Hybrid Threat to NATO's Operational Energy Security
|
2020 |
Dupuy, Arnold |
An Ontology for Cyber ISTAR in Offensive Cyber Operations
|
2020 |
Grant, Tim |
What LEGAD needs to know? Analysis of AARs from Locked Shields (2012-2018)
|
2020 |
Harašta, Jakub |
Usefulness of Cyber Attribution Indicators
|
2020 |
Karlzén, Henrik |