Can Attrition Theory Provide Insight for Cyber Warfare?
|
2022 |
Defibaugh, Stephen |
Shallow Deep Learning using Space-filling Curves for Malware Classification
|
2022 |
Long, David |
Analyzing the Performance of Block-Splitting in LVM Fingerprinting
|
2022 |
Mahoney, William |
Integrating Democratic Cybersecurity: Empowerment of Traditional Law Enforcement and Democratic Public Safety
|
2022 |
Losavio, Michael |
A New Dawn for Space Security
|
2022 |
Plotnek, Jordan J. |
Assessment of Cybersecurity Risks: Maritime Automated Piloting Process
|
2022 |
Pöyhönen, Jouni |
Rising Above Misinformation and Deepfakes
|
2022 |
Veerasamy, Namosha |
Multi-Purpose Cyber Environment for Maritime Sector
|
2022 |
Visky, Gabor |
The Impact of CISO Appointment Announcements on the Market Value of Firms
|
2022 |
Ford, Adrian |
Human Errors: A Cybersecurity Concern and the Weakest Link to Small Businesses
|
2022 |
Ncubukezi, Tabisa |
Need for a Cyber Resilience Framework for Critical ' Space Infrastructure
|
2022 |
Shahzad, Syed |
Social Media Privacy Using EDEE Security Model
|
2022 |
Yankson, Benjamin |
Analysis of Image Thresholding Algorithms for Automated Machine Learning Training Data Generation
|
2022 |
Creek, Tristan |
Securing InfiniBand Networks with the Bluefield-2 Data Processing Unit
|
2022 |
Diamond, Noah |
Improving Hardware Security on Talos II Architecture Through Boot Image Encryption
|
2022 |
Muramoto, Calvin |
Digital Risk Management: Investigating Human ractor Security with a Behaviorist Approach
|
2022 |
Pretorius, Ruan |
Technical Analysis of Thanos Ransomware
|
2022 |
Ogiriki, Ikuromor |
Mitigating Global Cyber Risk Through Bridging the National Incident Response Capacity Gap
|
2022 |
Dubois, Elisabeth |
New Wave Cyber Attacks
|
2022 |
Mison, Angela |
Research Gaps and Opportunities for Secure Access Service Edge
|
2022 |
Walt, Stephanus Petrus van der |