Cyber defense resources & vulnerabilities
Poster presented in the workshop on “Who Controls Cyberspace,” MIT, Cambridge, MA, United States, November 6-7, 2012.
Main Author: | Wolff, Josephine |
---|---|
Format: | Other (Poster) |
Language: | en_US |
Published: |
Explorations in Cyber International Relations
2022
|
Online Access: | https://hdl.handle.net/1721.1/141617 |
Similar Items
-
SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH
by: YUCEL TUREL
Published: (2013-01-01) -
Biometrics in cyber defense
by: Mogos Gabriela
Published: (2020-01-01) -
Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities
by: Donghwa Kim, et al.
Published: (2023-01-01) -
Mitigating cybersecurity risks in radiology—is it time to unmask vulnerabilities and fortify cyber defenses with ethical hacking?
by: Reuben Schmidt, et al.
Published: (2024-04-01) -
Preparing South Africa for Cyber Crime and Cyber Defense
by: Marthie Grobler, et al.
Published: (2013-10-01)