The Evolution of Cyber Fraud in the Past Decade
|
2021 |
Bobric, George-Daniel |
Global Social Network Warfare on Public Opinion
|
2021 |
Chen, Long |
Effectiveness of Covert Communication Channel Mitigation Across the OS! Model
|
2021 |
Creek, Tristan |
Cyber-Threat Analysis in the Remote Pilotage System
|
2021 |
Kovanen, Tiina |
Is Hacking Back Ever Worth it?
|
2021 |
Lemay, Antoine |
IoT Security and Forensics: A Case Study
|
2021 |
Martin, Erik David |
Digital Evidence in Disciplinary Hearings: Perspectives From South Africa
|
2021 |
Ramluckan, Trishana |
Educating the Examiner: Digital Forensics in an IoT and Embedded Environment
|
2021 |
Sutherland, lain |
Status Detector for Fuzzing-Based Vulnerability Mining of IEC 61850 Protocol
|
2021 |
Visky, Gábor |
Mobile Phone Surveillance: An Overview of Privacy and Security Legal Risks
|
2021 |
Watney, Murdoch |
Side Channel Attacks and Mitigations 2015-2020: A Taxonomy of Published Work
|
2021 |
Johnson, Andrew |
Employing Machine Learning Paradigms for Detecting DNS Tunnelling
|
2021 |
Miglani, Jitesh |
Use of Blockchain Technologies Within the Creative industry to Combat Fraud in the Production and (Re)Sale of Collectibles
|
2021 |
Pfeiffer, Alexander |
Ethics of Cybersecurity in Digital Healthcare and Well-Being of Elderly at Home
|
2021 |
Rajamäki, Jyri |
Al-Powered Defend Forward Strategy
|
2021 |
Chen, Jim |
Are Encypted Protocols Really a Guarantee of Privacy?
|
2021 |
Fesl, Jan |
Computer Aided Diagnostics of Digital Evidence Tampering (CADDET)
|
2021 |
Gladyshev, Babak Habibnia, Pavel |
Targeting in All-Domain Operations: Choosing Between Cyber and Kinetic Action
|
2021 |
Grant, Tim |
Weaknesses of IoT Devices in the Access Networks Used by People in Their Homes
|
2021 |
Hummelholm, Aarne |
A Review of National Cyber Security Strategies (NCSS) Using the ENISA Evaluation Framework
|
2021 |
Jackson-Summers, Angela |