Antarctica and Cyber-Security: Useful Analogy or Exposing Limitations?
|
2021 |
Alshdaifat, Shadi |
The Manifestation of Chinese Strategies Into Offensive Cyberspace Operations Targeting Sweden
|
2021 |
Bengtsson, Johnny |
Deepfake Video Detection
|
2021 |
Dayal, Shankar Bhawani |
Serious Games for Cyber Security: Elicitation andAnalysis of End-User Preferences and Organisational Needs
|
2021 |
Chockalingam, Sabarathinam |
Some Cybersecurity Governance Imperatives in Securing the Fourth Industrial Revolution
|
2021 |
Jaquire, Victor |
Critical Infrastructure Protection: Employer Expectations for Cyber Security Education in Finland
|
2021 |
Jaurimaa, Janne |
Mandatory Cybersecurity Training for all Space Force Guardians
|
2021 |
Lin, Banks |
The Unrehearsed Boom in Education Automation, Amid COVID-19 Flouts, a Potential Academic Integrity Cyber Risks (AICR)!
|
2021 |
Omogah, Fredrick Ochieng |
Resilience Management Concept for Railways and Metro Cyber-Physical Systems
|
2021 |
Rajamäk, Jyri |
Security and Safety of Unmanned Air Vehicles: An Overview
|
2021 |
Ramos, Sergio |
Emergency Response Model as a Part of the Smart Society
|
2021 |
Simola, Jussi |
Connected, Continual Conflict: Towards a Cybernetic Model of Warfare
|
2021 |
Scott, Keith |
The Threat of Juice Jacking
|
2021 |
Veerasamy, Namosha |
Inter-Process CFI for Peer/Reciprocal Monitoring in RISC-V-Based Binaries
|
2021 |
Oyinloye, Toyosi |
Peer2Peer Communication via Testnet Systems of Blockchain Networks: A new Playground for Cyberterrorists?
|
2021 |
Pfeiffer, Alexander |
The PUF Commitment: Evaluating the Stability of ISRAM-Cells
|
2021 |
Ahr, Pascal |
Asylum Seekers From Russia to Finland: A Hybrid Operation by Chance?
|
2021 |
Alenius, Kari |
Evasion of Port Scan Detection in Zeek and Snort and its Mitigation
|
2021 |
Barbour, Graham |
Global Military Machine Learning Technology Development Tracking and Evaluation
|
2021 |
Chen, Long |
A Strategy for Implementing an Incident Response Plan
|
2021 |
Fernandes, Alexandre |