An Ontology for Effective Security Incident Management
|
2022 |
Chockalingam, Sabarathinam |
Protecting Networks with Intelligent Diodes
|
2022 |
Dahlstrom, Jason |
Zero Trust Container Architecture (ZTCA): A Framework for Applying Zero Trust Principals to Docker Containers
|
2022 |
Leahy, Darragh |
Future Needs of the Cybersecurity Workforce
|
2022 |
Justice, Connie |
Taxonomy of Social Engineering Attacks: A Survey of Trends and Future Directions
|
2022 |
Maraj, Arianit |
Context-Aware Cyber Threat Intelligence Exchange Platform
|
2022 |
Motlhabi, Michael |
Blockchain Technology for Addressing Privacy and Security Issues in Cloud Computing
|
2022 |
Tehrani, Pardis Moslemzadeh |
The Development of Cybersecurity Awareness Measurement Model in the Water Sector
|
2022 |
Mufor, Bryan S. |
A Modern ICT Network Simulator for Co-Simulations in Smart Grid Applications
|
2022 |
Niehaus, Fabian |
Transient Execution and Side Channel Analysis: A Vulnerability or a Science Experiment?
|
2022 |
Shepherd, Michael |
What is a Substantial Contribution to a Research Project in Offensive Cyberspace Operations that Merits Co-Authorship?
|
2022 |
Huskaj, Gazmend |
An Exploration on APTs in Biocybersecurity and Cyberbiosecurity
|
2022 |
Palmer, Xavier-Lewis |
Ensuring the Security of Space Systems from Eavesdropping Attacks
|
2022 |
Richardson, Caleb |
Critical Systems Protection (CSP): The US Secret Service’s Tactical Cyber Capability for Securing Protectees
|
2022 |
Hyman, Austin |
Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack
|
2022 |
Cervini, James |
Bureau of Justice Student Computer and Digital Forensics Educational Opportunities Program: The Assessment of Online Graduate Students
|
2022 |
Choi, Kyung-Shick |
A Novel DevSecOps Model for Robust Security in an MQTT Internet of Things
|
2022 |
Ekoramaradhya, Manasa |
Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities
|
2022 |
Heverin, Thomas |
Advancing Cybersecurity Capabilities for South African Organisations Through R&D
|
2022 |
Khan, Zubeida Casmod |
Zero Trust and Advanced Persistent Threats: Who Will Win the War?
|
2022 |
Karabacak, Bilge |