Understanding human aspects for an effective information security management implementation. Published at:
Verkenning best practices cybersecurity informatiedeling Published at:
The embracement of risks Published at:
Information security behaviour Published at:
Social Engineering as an Approach for Probing Organizations to Improve IT Security Published at:
De ‘human’ factor in cybersecurity Published at:
End-users Compliance to the Information Security Policy Published at:
Revisiting the relationship between safety and security Published at:
Dutch National Security Reform Under Review Published at:
Show all
Defending against Implementation attackS Through mAchiNe learning Techniques Start:
End:
een Twents Onderzoek naar Extreem Laaggeluidsproducerende drones (OEL) Start:
End:
Encryption for all Start:
End:
Remediation of comPromised IoT Devices Start:
End:
SeReNity - Evidence-Based Security Response ceNters Start:
End:
Swarm collaborative Multi-Agent cybeR physical sysTems with shAred sensinG modalitiEs, 5G commuNication and micro-elecTromechanical Sensor arrays (SMART-AGENTS) Start:
End:
Show all