Cyber-enabled Influence Operations
P.A.L. Ducheine; Peter Schrijver
The possibility of replacing stones with mycliume composites
Sherif Ghaly (Student); Vana Tsimopoulou (Docent)
The attack and defense on aircraft trajectory prediction algorithms
van Iersel, Quincy G.; Murrieta-Mendoza, Alejandro; Patrón, Roberto S.Félix; Hashemi, Seyed M.; Botez, Ruxandra Mihaela
Alerting Consciences to Reduce Cybercrime
Asier Moneva (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lid Lectoraat); Wouter Klijnsoon (Onderzoeker)
Exploring Human and Environmental Factors that Make Organizations Resilient to Social Engineering Attacks
Michelle Ancher (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); Erbilcan Aslan (Student)
Exploring Human and Environmental Factors that Make Organizations Resilient to Social Engineering Attacks
Michelle Ancher (Lid Lectoraat)
Transition (Part 2)
Graaf, JW (Jan Willem) de (Lector)
Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
Heterogeneity in trajectories of cybercriminals
Steve van de Weijer (Onderzoeker); E.R. (Rutger) Leukfeldt (Lector); Thomas J. Holt (Onderzoeker)
The Evolution of Deterrence Strategy and Research
Lawrence Freedman






























