Accessible from the open web a qualitative analysis of the available open-source information involving cyber security and critical infrastructure
(Login to Download)
An IoT Privacy-Oriented selective disclosure credential system
(Login to Download)
Building a launchpad for satellite cyber-security research lessons from 60 years of spaceflight
(Login to Download)
China’s emerging data protection framework
(Login to Download)
Cybersecurity service level agreements understanding government data confidentiality requirements
(Login to Download)
Diversification across mining pools optimal mining strategies under PoW
(Login to Download)
Drivers and barriers for secure hardware adoption across ecosystem stakeholders
(Login to Download)
Entanglement cybercrime connections of a public forum population
(Login to Download)
Is there a cyber security dilemma
(Login to Download)
Overcoming information-sharing challenges in Cyber defence Exercise
(Login to Download)
The illogic of plausible deniability why proxy conflict in cyberspace may no longer pay
(Login to Download)
The impact of a cause–effect elaboration procedure on information security risk perceptions a construal fit perspective
(Login to Download)
Two explanations for the paucity of cyber-military, cross-domain operations
(Login to Download)
Unpacking strategic behavior in cyberspace a schema-driven approach
(Login to Download)