The PUF Commitment: Evaluating the Stability of ISRAM-Cells
|
2021 |
Ahr, Pascal |
Asylum Seekers From Russia to Finland: A Hybrid Operation by Chance?
|
2021 |
Alenius, Kari |
Evasion of Port Scan Detection in Zeek and Snort and its Mitigation
|
2021 |
Barbour, Graham |
Global Military Machine Learning Technology Development Tracking and Evaluation
|
2021 |
Chen, Long |
A Strategy for Implementing an Incident Response Plan
|
2021 |
Fernandes, Alexandre |
A Shoestring Digital Forensic Cyber Range for a Developing Country
|
2021 |
Toit, Jaco du |
Cyber Security Analysis for Ships in Remote Pilotage Environment
|
2021 |
Hummelholm, Aarne |
Impact of Al Regulations on Cybersecurity Practitioners
|
2021 |
Leenen, Louise |
EU Digital Sovereignty: A Regulatory Power Searching for its Strategic Autonomy in the Digital Domain
|
2021 |
Liaropoulos, Andrew |
Studying the Challenges and Factors Encouraging Girls in Cybersecurity: A Case Study
|
2021 |
Maraj, Arianit |
Cybersecurity and local Government: Imperative Challenges and Priorities
|
2021 |
Masombuka, Mmalerato |
Multiple-Extortion Ransomware: The Case for Active Cyber Threat Intelligence
|
2021 |
Payne, Bryson |
Defensive Cyber Deception: A Game Theoretic Approach
|
2021 |
Sokri, Abderrahmane |
Interdependence of Internal and External Security
|
2021 |
Tikanmäki, Ilkka |
The Host Nation Support for the International Cyber Operations
|
2021 |
Turunen, Maija |
A GDPR Compliant SIEM Solution
|
2021 |
Vazao, Ana |
The Impact of GDPR Infringement Fines on the Market Value of Firms
|
2021 |
Ford, Adrian |
Sanctions and Cyberspace: The Case of the EU’s Cyber Sanctions Regime
|
2021 |
Kapsokoli, Eleni |
Biocyberwarfare and Crime: A Juncture of Rethought
|
2021 |
Palmer, Xavier-Lewis |
Bio-Cyber Operations Inspired by the Human Immune System
|
2021 |
Pourmoafi, Seyedali |