Analysis of security lines policies for improving capacity in airports
Published at:
Restart: analysis of post-COVID 19 capacity in security checkpoints at Mexico City Airport
Published at:
Verkenning best practices cybersecurity informatiedeling
Published at:
The embracement of risks
Published at:
Information security behaviour
Published at:
Social Engineering as an Approach for Probing Organizations to Improve IT Security
Published at:
End-users Compliance to the Information Security Policy
Published at:
Dutch National Security Reform Under Review
Published at:
Qualification for information security professionals
Published at:
Defending against Implementation attackS Through mAchiNe learning Techniques
Start:
End:
Remediation of comPromised IoT Devices
Start:
End:
SeReNity - Evidence-Based Security Response ceNters
Start:
End:
Smart Energy Twin
Start:
End:
Towards the first and Best EU-approved Autonomous Security drone for BVLOS flighT (The BEAST)
Start:
End:
User-driven Path Verification and Control for Inter-domain Networks (UPIN)
Start:
End:
VIA NOVA – Car in the Cloud
Start:
End: