Rising to the Challenge of Insider Threats for Middle Powers (Englisch)
- Neue Suche nach: Modini, Jessemyn
- Neue Suche nach: Zomeren, Mark Van
- Neue Suche nach: Fowler, Stuart
- Neue Suche nach: Joiner, Keith
- Neue Suche nach: Lynar, Tim
- Neue Suche nach: Modini, Jessemyn
- Neue Suche nach: Zomeren, Mark Van
- Neue Suche nach: Fowler, Stuart
- Neue Suche nach: Joiner, Keith
- Neue Suche nach: Lynar, Tim
In:
15th International Conference on Cyber Warfare and Security (ICCWS 2020)
; 521-529
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Rising to the Challenge of Insider Threats for Middle Powers
-
Beteiligte:Modini, Jessemyn ( Autor:in ) / Zomeren, Mark Van ( Autor:in ) / Fowler, Stuart ( Autor:in ) / Joiner, Keith ( Autor:in ) / Lynar, Tim ( Autor:in )
-
Kongress:ICCWS ; 15. ; 2020 ; Norfolk, Va.
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Curran Associates, Inc.
-
Erscheinungsort:Red Hook, NY
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38 / 89.83
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Prey-Predator Model for Countering Internet- assisted Radicalization and RecruitmentAdhikari, Naresh / Bushra, Naila / Ghimire, Amrita et al. | 2020
- 9
-
Blockchain-based Redistricting Evaluation ProtocolAdhikari, Naresh / Bushra, Naila / Ramkumar, Mahalingam et al. | 2020
- 18
-
A Layered Network Collapse Method in Cyber TerrorismAlhajjar, Elie / Morse, Steve et al. | 2020
- 23
-
Resilient Cybersecurity ArchitectureAlHamdani, Wasim A. et al. | 2020
- 33
-
Cyber Alliances and Proxy Cyber WarfareBarbosa, Jorge et al. | 2020
- 39
-
Cyber Warfare: Can there be Small Cyber Military Powers?Barbosa, Jorge et al. | 2020
- 47
-
An Examination in Social Engineering: The Susceptibility of Disclosing Private Security Information in College StudentsBleiman, Rachel / Rege, Aunshul et al. | 2020
- 57
-
Fake News and Deepfakes: A Dangerous Threat for 21st Century information SecurityBotha, Jonny / Pieterse, Heloise et al. | 2020
- 67
-
Electronic Healthcare Record and Cyber Security Threats: A Development of an Agile FrameworkBouazzaoui, Sarah / Daniels, Charles et al. | 2020
- 72
-
Scalable Verification of NP Problems in BlockchainBushra, Naila / Adhikari, Naresh / Ramkumar, Mahalingam et al. | 2020
- 82
-
A Warfare Domain Approach to the Disinformation ProblemCanan, Mustafa / Akil, Anthony et al. | 2020
- 92
-
Countering Disinformation Propaganda: Reverse Engineering the Experimental Implicit Learning ParadigmCanan, Mustafa / Canan, Daphne et al. | 2020
- 102
-
The Strategy of Persistent Engagement: From Single Domain to Cross-DomainsChen, Jim Q. et al. | 2020
- 110
-
Fingerprinting Vehicles With CAN Bus Data SamplesCrow, David R. / Graham, Scott R. / Borghetti, Brett J. et al. | 2020
- 119
-
Mathematically Modelling Cyber-Attacks Utilizing Engineering TechniquesEasttom, Chuck et al. | 2020
- 127
-
Applying Systems Engineering Principles to Penetration TestingEasttom, Chuck / Butler, William et al. | 2020
- 135
-
From Simple Scoring Towards a Meaningful Interpretation of Learning in Cvbersecurity ExercisesErnits, Margus / Maennel, Kaie / Mäses, Sten / Lepik, Toomas / Maennel, Olaf et al. | 2020
- 144
-
Intelligent based Framework for Detection of Fake News in the Social Network PlatformsFasola, Olusanjo / Ojeniyi, Joseph / Oyeniyi, Samuel et al. | 2020
- 155
-
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot StudyFlack, Nathaniel / Voltz, Christopher / Dill, Richard / Lin, Alan / Reith, Mark et al. | 2020
- 165
-
Cyber Resilience through Machine Learning: Data ExfiltrationFletcher, Kieran / Smith, H. Anthony et al. | 2020
- 173
-
Connected Vehicle SecurityFrancia, III Guillermo A. et al. | 2020
- 182
-
Cyberwar as a New Type of War?Frantis, Petr et al. | 2020
- 187
-
A Strategic Roadmap for Cybersecurity Capability Engineering across Different EnvironmentsGcaza, Noluxolo / Mtsweni, Jabu et al. | 2020
- 195
-
An Analysis of Connected Cars Technology and SecurityGhafarian, Ahmad / Sardari, Saman et al. | 2020
- 204
-
Artificially Intelligent Systems and Human Rights: A Global PerspectiveGreiman, Virginia A. et al. | 2020
- 211
-
Information Policy Security Compliance in Dutch Local Government: Results from a Vignette SurveyHomburg, Vincent / Kokje, Jeroen et al. | 2020
- 219
-
Notre Dame Fire Conspiracism as Reflective of Russian Ideological Competition with the WestHotchkiss, Michael Bennett et al. | 2020
- 228
-
The Critical Need for Tool Validation before Using Malware Scanners in Digital ForensicsHughes, Nicolas / Varol, Cihan et al. | 2020
- 236
-
Avoiding the Pitfalls of an Artificial Reality (Is A. I. Real Enough)Hurley, John S. / Potter, Dorothy O. et al. | 2020
- 243
-
Toward an Ambidextrous Framework for Offensive Cyberspace Operations: A Theory, Policy and Practice PerspectiveHuskaj, Gazmend / Iftimie, Ion A. et al. | 2020
- 254
-
Anticipatory Ethics for Vulnerability DisclosureHuskaj, Gazmend / Wilson, Richard L. et al. | 2020
- 262
-
The Use of Signals Intelligence in Offensive Cyberspace Operations: An Anticipatory Ethical AnalysisIftimie, lon A. / Wilson, Richard L. et al. | 2020
- 270
-
Customers' Perception of Cybersecurity Threats Toward e-Banking Adoption and Retention: A Conceptual StudyJibril, Abdul Bashiru / Kwarteng, Michael Adu / Chovancova, Miloslava / Denanyoh, Richard et al. | 2020
- 277
-
A Fast Alert Correlation Method with Bayesian Feature ConstraintsKim, Minchul / Park, Youngwoo / Han, Insung / Cho, Sungyoung et al. | 2020
- 286
-
Crown in the Clouds: A Canadian Data Sovereignty CrisisKushwaha, Neal / Watson, Bruce W. et al. | 2020
- 296
-
Digital Forensic Readiness Framework for Software- Defined Networks Using a Trigger-Based Collection MechanismLagrasse, Maxime / Singh, Avinash / Munkhondya, Howard / Ikuesan, Adeyemi / Venter, Hein et al. | 2020
- 306
-
Representing Strategic Cyber and Information Warfare in Matrix GamesLee, Hyong / DeMuth, James et al. | 2020
- 316
-
Non-Kinetic Warfare: The New Game Changer in the Battle SpaceLehto, Martti / Henselmann, Gerhard et al. | 2020
- 326
-
Mini-Drones Swarms and Their Potential in Conflict SituationsLehto, Martti / Hutchinson, Bill et al. | 2020
- 335
-
Enhanced Channel-PUFs: The Advantages of Artificial Intelligence for Channel EstimationLipps, Christoph / Mallikarjun, Sachinkumar Bavikatti / Strufe, Mathias / Schotten, Hans Dieter et al. | 2020
- 346
-
Bring Your Own Device (BYOD) Information Security Risks: Case of LesothoMorolong, Mamoqenelo Priscilla / Shava, Fungai Bhunu / Gamundani, Attlee M. et al. | 2020
- 355
-
Complex Network Analysis for Evaluating Effects of Asymmetry Established by Closed National NetworksNikkarila, Juha-Pekka / Kuikka, Vesa et al. | 2020
- 363
-
Impact of Security and Trust as Factors that influence the Adoption and Use of Digital Technologies that Generate, Collect and Transmit User DataNwaiwu, Fortune / Kwarteng, Michael Adu / Jibril, Abdul Bashiru / Buřita, Ladislav / Pilik, Michal et al. | 2020
- 373
-
Defending Forward: An Exploration through the Lens of BiocybersecurityPalmer, Xavier-Lewis / Karahan, Saltuk et al. | 2020
- 380
-
Systemic Methodology for Cyber Offense and DefensePinto, C. Ariel / Zurasky, Matthew et al. | 2020
- 391
-
Distributed Authority as a Guiding set of Principles for Transnational Cyber Security GovernancePontbriand, Karine et al. | 2020
- 398
-
The New Role of the 'Next Generation' CFOPotter, Dorothy O. / Hurley, John S. et al. | 2020
- 402
-
Cyber-assets at Risk (CAR): The Cost of Personally identifiable Information Data BreachesPoyraz, Omer llker / Bouazzaoui, Sarah / Keskin, Omer / McShane, Michael / Pinto, C. Ariel et al. | 2020
- 411
-
Leveraging the Benefits of Big Data with Fast Data for Effective and Efficient Cybersecurity Analytics Systems: A Robust Optimisation ApproachRathod, Paresh / Hämäläinen, Timo et al. | 2020
- 423
-
International Information Power and Foreign Malign Influence in CyberspaceSchafer, Joseph H. et al. | 2020
- 431
-
Bug Bounties: Bottom-up Initiatives as Forms of Cyber Arms Control?Silomon, Jantje A. M. et al. | 2020
- 439
-
Modelling the Supply Chain: Trust but Verify in Complex SystemsSobb, Theresa / Sample, Char / Shelton, Cragin / Turnbull, Benjamin et al. | 2020
- 448
-
NetFlow Based Framework for Identifying Anomalous End User NodesVaarandi, Risto / Pihelgas, Mauno et al. | 2020
- 457
-
loT-based Adversarial Attack's Effect on Cloud Data Platform Services in a Smart Building ContextVähäkainu, Petri / Lehto, Martti / Kariluoto, Antti et al. | 2020
- 466
-
Cyber Probability of Kill: The Effectiveness of Malware in a Heterogeneous Software EnvironmentWebster, Brandon / Stenger, Matthew / Valcin, Alix / Coffman, Joel / Salazar, Carlos et al. | 2020
- 471
-
Who Hath Measured the (Proving) Ground: Variation in Offensive Capabilities Test and EvaluationWork, J. D. et al. | 2020
- 480
-
A Method for Teaching Open Source Intelligence (OSINT) Using Personalised Cloud-based ExercisesYari, Saber / Mäses, Sten / Maennel, Olaf et al. | 2020
- 493
-
Examining the “Known Truths” in Cyber Threat Intelligence — The Case of STIXBromander, Siri / Muller, Lilly Pijnenburg / Eian, Martin / Jøsang, Audun et al. | 2020
- 503
-
Career Development in Cyber Security: Bootcamp Training ProgramsCaliskan, Emin / Vaarandi, Risto et al. | 2020
- 512
-
An Anticipatory Ethical Analysis of Offensive Cyberspace OperationsHuskaj, Gazmend / Wilson, Richard L. et al. | 2020
- 521
-
Rising to the Challenge of Insider Threats for Middle PowersModini, Jessemyn / Zomeren, Mark Van / Fowler, Stuart / Joiner, Keith / Lynar, Tim et al. | 2020
- 530
-
Psychometric Modelling of Cybersecurity RolesPoteete, Paul Wyatt et al. | 2020
- 539
-
National Cyber Threat Prevention Mechanism as a part of the E-EWSSimola, Jussi / Lehto, Martti J. et al. | 2020
- 549
-
Beyond 2000: The Rise of Australian Cyber Warfare CapabilityWilliams, Andrew et al. | 2020
- 559
-
Cybersecurity Knowledge Requirements for Strategic Level Decision MakersGarcia-Granados, Fernando / Bahsi, Hayretdin et al. | 2020
- 569
-
A Review of Security System Assessment Tools Suitable for eHealth in NamibiaGerson, Naemi / Shava, Fungai Bhunu et al. | 2020
- 576
-
An Analysis of Social Networking ThreatsKahimise, Jennyphar / Shava, Fungai Bhunu et al. | 2020
- 584
-
A Case for a Dynamic Approach to Digital Forensic Readiness in an SDN PlatformMunkhondya, Howard / Ikuesan, Adeyemi R. / Venter, Hein S. et al. | 2020
- 597
-
Cyber Attack Grammars for Risk/Cost AnalysisPatten, Terry / Mitchell, Daniel / Call, Catherine et al. | 2020
- 609
-
Alternate Coupling for Targeted Supply Chain AttacksRohret, David M. / Jimenez, Abiud et al. | 2020
- 617
-
A Defined Digital Forensic Criteria for Cybercrime ReportingBaror, Stacey Omeleze / Ikuesan, Richard Adeyemi / Venter, Hein S. et al. | 2020
- 627
-
Digital Forensic Readiness Framework for Smart HomesPhilomin, Sebastien / Singh, Avinash / Ikuesan, Adeyemi / Venter, Hein et al. | 2020