Analysis of security lines policies for improving capacity in airports
Gepubliceerd op:
Restart: analysis of post-COVID 19 capacity in security checkpoints at Mexico City Airport
Gepubliceerd op:
Verkenning best practices cybersecurity informatiedeling
Gepubliceerd op:
The embracement of risks
Gepubliceerd op:
Information security behaviour
Gepubliceerd op:
Social Engineering as an Approach for Probing Organizations to Improve IT Security
Gepubliceerd op:
End-users Compliance to the Information Security Policy
Gepubliceerd op:
Dutch National Security Reform Under Review
Gepubliceerd op:
Qualification for information security professionals
Gepubliceerd op:
Defending against Implementation attackS Through mAchiNe learning Techniques
Start:
Eind:
Remediation of comPromised IoT Devices
Start:
Eind:
SeReNity - Evidence-Based Security Response ceNters
Start:
Eind:
Smart Energy Twin
Start:
Eind:
Towards the first and Best EU-approved Autonomous Security drone for BVLOS flighT (The BEAST)
Start:
Eind:
User-driven Path Verification and Control for Inter-domain Networks (UPIN)
Start:
Eind:
VIA NOVA – Car in the Cloud
Start:
Eind: