Loading…
Building Trust in Smart TVs: AI-Enhanced Cybersecurity for User Privacy and Ethical Monetization
Singh, Nakul, Kumar, Shreyas, Singh, Tripti, Kumar, Pratyush
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Cyberbiosecurity in Healthcare: Securing Medical Devices from Digital and Biological Threats
Okpalanozie, Valentine, Sani, Abuh Ibrahim, Adeleye, Oluwaseyi, Eniafe, Fatimah, Adefabi, Raheemat, Onimole, Oludolamu, Osamor, Jude, Palmer, Xavier, Potter, Lucas
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Strategies to Tackle Disinformation: Operationalizing Zero Trust
Get full text
Conference Proceeding
Loading…
Cybersecurity Practices, Challenges and Posture in Small and Medium Enterprises: A Survey-Study in Sweden
Lindkvist, Anton, Höglund, Eira, Djebbar, Fatiha
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Cyber Warfare and Critical Infrastructure
Ramage, Xavier, Lebea, Khutso, Sithungu, Siphesihle
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Cybersecurity Education in Finnish Universities of Applied Sciences: Workforce Alignment
Ekqvist, Jani, Kämppi, Pasi, Rajamäki, Jyri
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Cognitive Hacking and Social Engineering in Healthcare: Exploiting Human Behaviour
Adefabi, Raheemat, Onimole, Oludolamu, Sani, Abuh Ibrahim, Okpalanozie, Valentine, Olajide, Ahmed Olabisi, Oseni, Taiwo, Iwuoha, Chimeziri Chima, Eniafe, Fatimah, Palmer, Xavier, Potter, Lucas
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Measures, Metrics, and a Scale for Appraisal of Cyber Threat Intelligence-Informed Decision-Making
Kriesten, Mona, Thinyane, Mamello, Ormrod, David
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Loading…
Enhancing Healthcare Data Security Using Blockchain
Makura, Sheunesu, Venter, Hein, Lukhozi, Azola
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Envisioning New Ways to Use Economic Sanctions and Weaponisation in the Future
Hiltunen, Elina, Aalto, Mika, Hyytiäinen, Mika, Huhtinen, Aki-Mauri
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Enhancing Cybersecurity in Healthcare: The KyberSoTe Project's Approach to Mitigating Cyber Threats
Tikanmäki, Ilkka, Blek, Tilna, Niskakangas, Johanna, Varamäki, Katja
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
ECCWS Preface
Lipps, Christoph, Han, Bin
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Security Vulnerability Assessment on Threads Application Through Digital Forensics Analysis
Perera, Wadduwage Shanika, Islam, Ahsan, Varol, Cihan
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Journalists' Reflections on Fake News: Insights from Qualitative Interviews
Get full text
Conference Proceeding
Loading…
Loading…
Quantum Apocalypse: Fortifying Critical Infrastructure in the Age of Cyber Warfare
Kumar, Shreyas, Klappenecker, Andreas, Brown, Garry, Saravanan, Seshadithya
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Implementing the European Cybersecurity Skills Framework (ECSF): A Case Study of EU Innovation Projects
Rathod, Paresh, Kioskli, Kitty, Rajamäki, Jyri
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
CyberX 2.0: From Hacks to Head Games - Evolving Cyber Defence with Strategic Twists and Tactical Consequences
Knight, Scott, Leblanc, Sylvain, Devendorf, Erich, Shuck, Mike
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding
Loading…
Hyper-Connected: Information Security Education for Today's Children
Mukondeleli, Elekanyani, Latakgomo, Molebogeng, Mahlasela, Oyena, Siphambili, Nokuthaba
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2025)
Conference Proceeding