共 50 条
- [1] The Case for Cyber Counterintelligence [J]. 2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,
- [2] Towards a Cyber Counterintelligence Maturity Model [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 432 - 440
- [3] A Cyber Counterintelligence Matrix for Outsmarting Your Adversaries [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 187 - 193
- [8] Developing a Cyber Counterintelligence Maturity Model for Developing Countries [J]. 2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
- [9] The Cyber Counterintelligence Process: A Conceptual Overview and Theoretical Proposition [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 42 - 51
- [10] Conceptualising Cyber Counterintelligence: Two Tentative Building Blocks [J]. PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 93 - 103