Cyberbullying Indicator as a Precurson to a Cyber Construct Development
|
2022 |
Al-Romaihi, Salam Khalifa |
Education and Training Against Threat of Phishing Emails
|
2022 |
Burita, Ladislav |
Design and Evaluation of a Cyber Protection Team Planner Work Aid
|
2022 |
Liggett, Kristen |
On Explainable Al Solutions for Targeting in Cyber Military Operations
|
2022 |
Maathuis, Clara |
I Know You by Heart: Biometric Authentication based on Electrocardiogram (ECG) signals
|
2022 |
Lipps, Christoph |
Specialised Media Monitoring Tool to Observe Situational Awareness
|
2022 |
Pieterse, Heloise |
Aligning South African Data and Cloud Policy with the PoPI Act
|
2022 |
Raaff, Emma |
Utilizing Switch Port Link State to Detect Rogue Switches
|
2022 |
Quitiquit, Travis |
Bug Bounties: Between New Regulations and Geopolitical Dynamics
|
2022 |
Silomon, Jantje |
The Cumulative Cyber Deterrence
|
2022 |
Turunen, Maija |
Ransomware Detection using Process Memory
|
2022 |
Singh, Avinash |
Evaluating the Reliability of Android Userland and Memory Forensics
|
2022 |
Sudhakaran, Sneha |
Defending Small Satellites from Malicious Cybersecurity Threats
|
2022 |
Lin, Banks |
Analysis of Sexual Abuse of Children Online and CAM Investigations in Finland
|
2022 |
Paraviainen, Johanna |
Addressing the Skills Shortage in Cybersecurity
|
2022 |
Davies, Gareth |
The Failure of Trust in Trusted Systems
|
2022 |
Mison, Angela |
Cyberwarfare and its Effects on Critical Infrastructure
|
2022 |
Bhaiyat, Humairaa Yacoob |
An Ontology for Effective Security Incident Management
|
2022 |
Chockalingam, Sabarathinam |
Protecting Networks with Intelligent Diodes
|
2022 |
Dahlstrom, Jason |
Zero Trust Container Architecture (ZTCA): A Framework for Applying Zero Trust Principals to Docker Containers
|
2022 |
Leahy, Darragh |