Bureau of Justice Student Computer and Digital Forensics Educational Opportunities Program: The Assessment of Online Graduate Students

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Cyber Warfare and Security (17. : 2022 : Albany, NY; Online) 17th International Conference on Cyber Warfare and Security (ICCWS 2021)
1. Verfasser: Choi, Kyung-Shick (VerfasserIn)
Weitere Verfasser: Lou, Chitkushev (VerfasserIn), Choo, Kyung-Seok (VerfasserIn), Lee, Claire Seungeun (VerfasserIn)
Pages:17
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack 2022 Cervini, James
Bureau of Justice Student Computer and Digital Forensics Educational Opportunities Program: The Assessment of Online Graduate Students 2022 Choi, Kyung-Shick
A Novel DevSecOps Model for Robust Security in an MQTT Internet of Things 2022 Ekoramaradhya, Manasa
Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities 2022 Heverin, Thomas
Advancing Cybersecurity Capabilities for South African Organisations Through R&D 2022 Khan, Zubeida Casmod
Zero Trust and Advanced Persistent Threats: Who Will Win the War? 2022 Karabacak, Bilge
APT Cyber-Attack Modelling: Building a General Model 2022 Lehto, Martti
Towards Detection of Selfish Mining Using Machine Learning 2022 Peterson, Matthew
Cricuit-Variant Moving Target Defense for Side-Channel Attacks 2022 Mullins, Tristen
Emerging Cyber risk Challenges in Maritime Transportation 2022 Simola, Jussi
Improving Protection Against Cybersecurity Attacks of Emergency Dispatch Centers 2022 Sweeney, James
Identifying Adversaries’ Signatures Using Knowledge van der Merwe and Dewald Blaauw Representations of Cyberattack Techniques on Cloud Infrastructure 2022 Merwe, Gilliam van der
Increasing Industry Profitability and Cyber Hygiene Utilizing Awareness Progression Methods 2022 Thebarge, John
Ethical and Legal Aspects Pertaining to law Enforcement use of Drones 2022 Watney, M. M.
Performance Implications for Multi-Core RISC-V Systems with Dedicated Security Hardware 2022 Chadwick, Samuel
Malware Binary Image Classification Using ı Convolutional Neural Networks 2022 Kiger, John
WFH, not WTH? The Security Challenges of Working-From-Home 2022 Kushwaha, Neal
The Role of Big Tech in Future Cyber Defence 2022 Mison, Angela
Out Beyond Jointery’: Developing a Model for Gaming Multi-Domain Warfare 2022 Scott, Keith
Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods 2022 Nath, Bhagawan
Alle Artikel auflisten