共 50 条
- [41] Cyber Security without Cyber War JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209
- [42] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
- [43] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
- [44] What kind of cyber security? Theorising cyber security and mapping approaches INTERNET POLICY REVIEW, 2018, 7 (02):
- [45] Cyber Security via Signaling Games: Toward a Science of Cyber Security DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
- [47] Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018 Computational and Mathematical Organization Theory, 2020, 26 : 465 - 483
- [48] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
- [50] LAGGING COLOSSUS OR A MATURE CYBER-ALLIANCE? 20 Years of Cyber Defence in NATO OBRANA A STRATEGIE-DEFENCE & STRATEGY, 2019, 19 (01): : 5 - 22