The attack and defense on aircraft trajectory prediction algorithms
van Iersel, Quincy G.; Murrieta-Mendoza, Alejandro; Patrón, Roberto S.Félix; Hashemi, Seyed M.; Botez, Ruxandra Mihaela
Transition (Part 2)
Graaf, JW (Jan Willem) de (Lector)
Heterogeneity in trajectories of cybercriminals
Steve van de Weijer (Onderzoeker); E.R. (Rutger) Leukfeldt (Lector); Thomas J. Holt (Onderzoeker)
Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
The Evolution of Deterrence Strategy and Research
Lawrence Freedman
Japanese Concepts of Deterrence
Nori Katagiri
Cyber Security for Power System operators
Casper van der Sluis (Student); B. (Ben) Kuiper
Combating Islamic Radicalisation in France and in the Netherlands
Miriam Louka (Student); Marije A. Minkman
Expanding the customer base of sensurity through digital strategy
Dominic Janse (Student); J.T.C. Jessen (Begeleider); Geoff Clarke (Begeleider)
The workprogram for penetration testing of ZigBee enabled IoT devices
Rusek, Dominika (Student); Jedeloo, Arthur; Slobbe, Jeroen