Cyberbullying Indicator as a Precurson to a Cyber Construct Development
|
2022 |
Al-Romaihi, Salam Khalifa |
Education and Training Against Threat of Phishing Emails
|
2022 |
Burita, Ladislav |
Design and Evaluation of a Cyber Protection Team Planner Work Aid
|
2022 |
Liggett, Kristen |
On Explainable Al Solutions for Targeting in Cyber Military Operations
|
2022 |
Maathuis, Clara |
I Know You by Heart: Biometric Authentication based on Electrocardiogram (ECG) signals
|
2022 |
Lipps, Christoph |
Specialised Media Monitoring Tool to Observe Situational Awareness
|
2022 |
Pieterse, Heloise |
Aligning South African Data and Cloud Policy with the PoPI Act
|
2022 |
Raaff, Emma |
Utilizing Switch Port Link State to Detect Rogue Switches
|
2022 |
Quitiquit, Travis |
Bug Bounties: Between New Regulations and Geopolitical Dynamics
|
2022 |
Silomon, Jantje |
The Cumulative Cyber Deterrence
|
2022 |
Turunen, Maija |
Ransomware Detection using Process Memory
|
2022 |
Singh, Avinash |
Evaluating the Reliability of Android Userland and Memory Forensics
|
2022 |
Sudhakaran, Sneha |
Defending Small Satellites from Malicious Cybersecurity Threats
|
2022 |
Lin, Banks |
Analysis of Sexual Abuse of Children Online and CAM Investigations in Finland
|
2022 |
Paraviainen, Johanna |
Addressing the Skills Shortage in Cybersecurity
|
2022 |
Davies, Gareth |
The Failure of Trust in Trusted Systems
|
2022 |
Mison, Angela |
Cyberwarfare and its Effects on Critical Infrastructure
|
2022 |
Bhaiyat, Humairaa Yacoob |
Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack
|
2022 |
Cervini, James |
Bureau of Justice Student Computer and Digital Forensics Educational Opportunities Program: The Assessment of Online Graduate Students
|
2022 |
Choi, Kyung-Shick |
A Novel DevSecOps Model for Robust Security in an MQTT Internet of Things
|
2022 |
Ekoramaradhya, Manasa |