The perceptions of digitalization and cyber security Published at:
The Soft Skills Business Demands of the Chief Information Security Officer Published at:
Soft skills of the chief security information officer Published at:
Understanding human aspects for an effective information security management implementation. Published at:
Information security behaviour Published at:
End-users Compliance to the Information Security Policy Published at:
Dutch National Security Reform Under Review Published at:
Qualification for information security professionals Published at:
Factors influencing Non-Compliance behavior towards Information Security Policies Published at:
Show all
Defending against Implementation attackS Through mAchiNe learning Techniques Start:
End:
Geriatrische revalidatie op afstand: businesscase en beveiliging van informatie Start:
End:
Integrated distributed SCADA security through local approximations of power flow equations Start:
End:
Performing Working (PD) Start:
End:
Remediation of comPromised IoT Devices Start:
End:
SeReNity - Evidence-Based Security Response ceNters Start:
End:
SHARE - Sharing data with cryptograpHic and differentiAlly pRivate guarantEes Start:
End:
Smart Energy Twin Start:
End:
Swarm collaborative Multi-Agent cybeR physical sysTems with shAred sensinG modalitiEs, 5G commuNication and micro-elecTromechanical Sensor arrays (SMART-AGENTS) Start:
End:
Show all