The perceptions of digitalization and cyber security Gepubliceerd op:
The Soft Skills Business Demands of the Chief Information Security Officer Gepubliceerd op:
Understanding human aspects for an effective information security management implementation. Gepubliceerd op:
Verkenning best practices cybersecurity informatiedeling Gepubliceerd op:
Information security behaviour Gepubliceerd op:
End-users Compliance to the Information Security Policy Gepubliceerd op:
Dutch National Security Reform Under Review Gepubliceerd op:
Qualification for information security professionals Gepubliceerd op:
Factors influencing Non-Compliance behavior towards Information Security Policies Gepubliceerd op:
Alles weergeven
Defending against Implementation attackS Through mAchiNe learning Techniques Start:
Eind:
Geriatrische revalidatie op afstand: businesscase en beveiliging van informatie Start:
Eind:
Integrated distributed SCADA security through local approximations of power flow equations Start:
Eind:
Performing Working (PD) Start:
Eind:
Remediation of comPromised IoT Devices Start:
Eind:
SeReNity - Evidence-Based Security Response ceNters Start:
Eind:
SHARE - Sharing data with cryptograpHic and differentiAlly pRivate guarantEes Start:
Eind:
Smart Energy Twin Start:
Eind:
Swarm collaborative Multi-Agent cybeR physical sysTems with shAred sensinG modalitiEs, 5G commuNication and micro-elecTromechanical Sensor arrays (SMART-AGENTS) Start:
Eind:
Alles weergeven