Cyberbullying Indicator as a Precurson to a Cyber Construct Development
|
2022 |
Al-Romaihi, Salam Khalifa |
Education and Training Against Threat of Phishing Emails
|
2022 |
Burita, Ladislav |
Design and Evaluation of a Cyber Protection Team Planner Work Aid
|
2022 |
Liggett, Kristen |
On Explainable Al Solutions for Targeting in Cyber Military Operations
|
2022 |
Maathuis, Clara |
I Know You by Heart: Biometric Authentication based on Electrocardiogram (ECG) signals
|
2022 |
Lipps, Christoph |
Specialised Media Monitoring Tool to Observe Situational Awareness
|
2022 |
Pieterse, Heloise |
Aligning South African Data and Cloud Policy with the PoPI Act
|
2022 |
Raaff, Emma |
Utilizing Switch Port Link State to Detect Rogue Switches
|
2022 |
Quitiquit, Travis |
Bug Bounties: Between New Regulations and Geopolitical Dynamics
|
2022 |
Silomon, Jantje |
The Cumulative Cyber Deterrence
|
2022 |
Turunen, Maija |
Ransomware Detection using Process Memory
|
2022 |
Singh, Avinash |
Evaluating the Reliability of Android Userland and Memory Forensics
|
2022 |
Sudhakaran, Sneha |
Defending Small Satellites from Malicious Cybersecurity Threats
|
2022 |
Lin, Banks |
Analysis of Sexual Abuse of Children Online and CAM Investigations in Finland
|
2022 |
Paraviainen, Johanna |
Addressing the Skills Shortage in Cybersecurity
|
2022 |
Davies, Gareth |
The Failure of Trust in Trusted Systems
|
2022 |
Mison, Angela |
Cyberwarfare and its Effects on Critical Infrastructure
|
2022 |
Bhaiyat, Humairaa Yacoob |
Can Attrition Theory Provide Insight for Cyber Warfare?
|
2022 |
Defibaugh, Stephen |
Shallow Deep Learning using Space-filling Curves for Malware Classification
|
2022 |
Long, David |
Analyzing the Performance of Block-Splitting in LVM Fingerprinting
|
2022 |
Mahoney, William |