Defending industrial control systems: an end-to-end approach for managing cyber-physical risk
PDF
Dynamic graph analytics for cyber systems security applications
PDF
Improving network security through cyber-insurance
PDF
Game theoretic deception and threat screening for cyber security
PDF
Cyber-harassment in higher education: online learning environments
PDF
A function-based methodology for evaluating resilience in smart grids
PDF
Verification, learning and control in cyber-physical systems
PDF
Theoretical foundations for modeling, analysis and optimization of cyber-physical-human systems
PDF
Utilizing data analytics in the field of physical security: an exploratory study
PDF
A research study of employee perceptions on identifying phishing attacks in financial organizations
PDF
Theoretical foundations and design methodologies for cyber-neural systems
PDF
Emerging technology and its impact on security policy
PDF
Democracy in the 21st century: social media and politics - global village or cyber-Balkans?
PDF
Water security, national security and MCIWest: a grounded theory for operationalizing risk management
PDF
Using telemetry to ensure safe and reliable medical device operation: experience with defibrillators and infusion pumps
PDF
Girls in cybersecurity: an evaluation study
PDF
Code 'war' theorizing: information and communication technology's impact on international relations theorizing, negotiation, and cyber relations
PDF
Novel and efficient schemes for security and privacy issues in smart grids
PDF
Cryptographic currency and economic security: threats, opportunities, and regulatory challenges
PDF
Cyber-nationalism in China: the relationship between government and netizens
PDF
Modeling human bounded rationality in opportunistic security games
PDF
Hierarchical planning in security games: a game theoretic approach to strategic, tactical and operational decision making
PDF
Towards addressing spatio-temporal aspects in security games
PDF
Improving network security through collaborative sharing
PDF
Organizational structuring for homeland security: a U.S. state-by-state comparative analysis
PDF
of 19 
 For more images, please select "images" in the filters.
1 - 50 of 931
of 19 
Standard Filters