Understanding human aspects for an effective information security management implementation. Gepubliceerd op:
The embracement of risks Gepubliceerd op:
Information security behaviour Gepubliceerd op:
Social Engineering as an Approach for Probing Organizations to Improve IT Security Gepubliceerd op:
De ‘human’ factor in cybersecurity Gepubliceerd op:
End-users Compliance to the Information Security Policy Gepubliceerd op:
Computer Security Incident Response Team Effectiveness: A Needs Assessment Gepubliceerd op:
Revisiting the relationship between safety and security Gepubliceerd op:
Dutch National Security Reform Under Review Gepubliceerd op:
Alles weergeven
Defending against Implementation attackS Through mAchiNe learning Techniques Start:
Eind:
een Twents Onderzoek naar Extreem Laaggeluidsproducerende drones (OEL) Start:
Eind:
Encryption for all Start:
Eind:
Remediation of comPromised IoT Devices Start:
Eind:
SeReNity - Evidence-Based Security Response ceNters Start:
Eind:
Swarm collaborative Multi-Agent cybeR physical sysTems with shAred sensinG modalitiEs, 5G commuNication and micro-elecTromechanical Sensor arrays (SMART-AGENTS) Start:
Eind:
Alles weergeven