Cyber security query

被引:0
|
作者
Cochran, RB
机构
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
引用
收藏
页码:8 / 8
页数:1
相关论文
共 50 条
  • [11] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [12] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    [J]. 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [13] Cyber Mission Assurance for Cyber Security
    MacKay M.
    [J]. ITNOW, 2020, 62 (01) : 32 - 33
  • [14] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    [J]. JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209
  • [15] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [16] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [17] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    [J]. INTERNET POLICY REVIEW, 2018, 7 (02):
  • [18] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [19] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    [J]. CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [20] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    [J]. COMPUTERS & SECURITY, 2013, 38 : 97 - 102