Antarctica and Cyber-Security: Useful Analogy or Exposing Limitations?
|
2021 |
Alshdaifat, Shadi |
The Manifestation of Chinese Strategies Into Offensive Cyberspace Operations Targeting Sweden
|
2021 |
Bengtsson, Johnny |
Deepfake Video Detection
|
2021 |
Dayal, Shankar Bhawani |
Serious Games for Cyber Security: Elicitation andAnalysis of End-User Preferences and Organisational Needs
|
2021 |
Chockalingam, Sabarathinam |
Some Cybersecurity Governance Imperatives in Securing the Fourth Industrial Revolution
|
2021 |
Jaquire, Victor |
Critical Infrastructure Protection: Employer Expectations for Cyber Security Education in Finland
|
2021 |
Jaurimaa, Janne |
Mandatory Cybersecurity Training for all Space Force Guardians
|
2021 |
Lin, Banks |
The Unrehearsed Boom in Education Automation, Amid COVID-19 Flouts, a Potential Academic Integrity Cyber Risks (AICR)!
|
2021 |
Omogah, Fredrick Ochieng |
Resilience Management Concept for Railways and Metro Cyber-Physical Systems
|
2021 |
Rajamäk, Jyri |
Security and Safety of Unmanned Air Vehicles: An Overview
|
2021 |
Ramos, Sergio |
Emergency Response Model as a Part of the Smart Society
|
2021 |
Simola, Jussi |
Connected, Continual Conflict: Towards a Cybernetic Model of Warfare
|
2021 |
Scott, Keith |
The Threat of Juice Jacking
|
2021 |
Veerasamy, Namosha |
Inter-Process CFI for Peer/Reciprocal Monitoring in RISC-V-Based Binaries
|
2021 |
Oyinloye, Toyosi |
Peer2Peer Communication via Testnet Systems of Blockchain Networks: A new Playground for Cyberterrorists?
|
2021 |
Pfeiffer, Alexander |
The Evolution of Cyber Fraud in the Past Decade
|
2021 |
Bobric, George-Daniel |
Global Social Network Warfare on Public Opinion
|
2021 |
Chen, Long |
Effectiveness of Covert Communication Channel Mitigation Across the OS! Model
|
2021 |
Creek, Tristan |
Cyber-Threat Analysis in the Remote Pilotage System
|
2021 |
Kovanen, Tiina |
Is Hacking Back Ever Worth it?
|
2021 |
Lemay, Antoine |