Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Instant Friend-or-Foe Identification for Stealth Devices in Coalition-Drone Swarms
Lassfolk, Christina, Kari, Hannu
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Enhancement of Phishing Email Detection with Bayesian Networks: A Cyber Security Training Module
Lappas, Dimitrios, Karampelas, Panagiotis, Fesakis, Giorgos
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Signalling Cyber Deterrence Through D3FEND
Halunen, Kimmo, Keinonen, Maria
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Measures, Metrics, and a Scale for Appraisal of Cyber Threat Intelligence-Informed Decision-Making
Kriesten, Mona, Thinyane, Mamello, Ormrod, David
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Detecting Rogue Switch and Device Behaviour Using Network Anomalies in LAN
Bhuse, Vijay, Kanipakam, Vijay Prathap Reddy, Patil, Rajvardhan, Wang, Xinli
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Bridging Knowledge Gaps: Advancing Cybersecurity Education via Absorptive Capacity and Collaboration
Esmaili, Reza, van Dijk, Gerda
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Supporting Cyber Intelligence Analysts with Enterprise Security Modeling
Kim, Sung, Leune, Kees, Benson, Christopher
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Sabermetrics for Cyber: Collecting and Analyzing User Activity Data from Ephemeral Exercises
Rivera, Jael, Booz, Jarrett, Hammerstein, Josh
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Cyber Warfare and Critical Infrastructure
Ramage, Xavier, Lebea, Khutso, Sithungu, Siphesihle
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Wireless Body Area Networks in Healthcare: Evolution, Challenges, and Pathways to Innovation
Herbst, Jan, Petershans, Jan, Shobairian, Seyedeh Ghazal, Schotten, Hans
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Enhancing Healthcare Data Security Using Blockchain
Makura, Sheunesu, Venter, Hein, Lukhozi, Azola
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Civic Cyber Defence/Resilience: A Review of Approaches
Warren, Matthew, Laurinaitis, Marius, de Castel, Inga Malinauskaitè-van
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Navigating the Cyber Resilience Act: Implications for the Dynamo Horizon Project
Rajamäki, Jyri, Koskela, Petra, Mehtonen, Sami, Lämsä, Verneri, Korpila, Sara, Lämsä, Tero
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding