共 50 条
- [21] Using Cyber Competitions to Build a Cyber Security Talent Pipeline and Skilled Workforce INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 280 - 289
- [23] Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021), 2021, : 123 - 128
- [24] Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media CIKM'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2017, : 1049 - 1057
- [25] Combining Cybersecurity and Cyber Defense to achieve Cyber Resilience 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 87 - 93
- [26] THE DEVELOPMENT OF EU CYBERSECURITY POLICY: FROM A COORDINATING ACTOR TO A CYBER POWER? ANKARA AVRUPA CALISMALARI DERGISI-ANKARA REVIEW OF EUROPEAN STUDIES, 2022, 21 (02): : 467 - 495
- [28] Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance International Cybersecurity Law Review, 2022, 3 (1): : 7 - 34
- [30] The ultimate cybersecurity checklist for your workforce Computer Fraud and Security, 2007, 2007 (09): : 14 - 19