The Evolution of Cyber Fraud in the Past Decade
|
2021 |
Bobric, George-Daniel |
Global Social Network Warfare on Public Opinion
|
2021 |
Chen, Long |
Effectiveness of Covert Communication Channel Mitigation Across the OS! Model
|
2021 |
Creek, Tristan |
Cyber-Threat Analysis in the Remote Pilotage System
|
2021 |
Kovanen, Tiina |
Is Hacking Back Ever Worth it?
|
2021 |
Lemay, Antoine |
IoT Security and Forensics: A Case Study
|
2021 |
Martin, Erik David |
Digital Evidence in Disciplinary Hearings: Perspectives From South Africa
|
2021 |
Ramluckan, Trishana |
Educating the Examiner: Digital Forensics in an IoT and Embedded Environment
|
2021 |
Sutherland, lain |
Status Detector for Fuzzing-Based Vulnerability Mining of IEC 61850 Protocol
|
2021 |
Visky, Gábor |
Mobile Phone Surveillance: An Overview of Privacy and Security Legal Risks
|
2021 |
Watney, Murdoch |
Side Channel Attacks and Mitigations 2015-2020: A Taxonomy of Published Work
|
2021 |
Johnson, Andrew |
Employing Machine Learning Paradigms for Detecting DNS Tunnelling
|
2021 |
Miglani, Jitesh |
Use of Blockchain Technologies Within the Creative industry to Combat Fraud in the Production and (Re)Sale of Collectibles
|
2021 |
Pfeiffer, Alexander |
Ethics of Cybersecurity in Digital Healthcare and Well-Being of Elderly at Home
|
2021 |
Rajamäki, Jyri |
Al-Powered Defend Forward Strategy
|
2021 |
Chen, Jim |
The PUF Commitment: Evaluating the Stability of ISRAM-Cells
|
2021 |
Ahr, Pascal |
Asylum Seekers From Russia to Finland: A Hybrid Operation by Chance?
|
2021 |
Alenius, Kari |
Evasion of Port Scan Detection in Zeek and Snort and its Mitigation
|
2021 |
Barbour, Graham |
Global Military Machine Learning Technology Development Tracking and Evaluation
|
2021 |
Chen, Long |
A Strategy for Implementing an Incident Response Plan
|
2021 |
Fernandes, Alexandre |