Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems
(Login to Download)
Exponentia
(Login to Download)
Going from bad to worse: from Internet voting to blockchain voting
(Login to Download)
Manipulating uncertainty: cybersecurity politics in Egypt
(Login to Download)
Risk and uncertainty can be analyzed in cyberspace
(Login to Download)
Attribution and Knowledge Creation Assemblages in Cybersecurity Politics
(Login to Download)