1.2: Privacy and Legal Implications Regarding the Processing of Honeypot Data
23:23
WR D2 Factors influencing Sensitive Data Protection practices in South African public schools
30:43
WR D2 Contextual Factors Influencing the Cybersecurity Commitment of Government Institutions in Deve
21:34
2.2: Using artificial intelligence techniques to standardize intelligent and automated generation...
21:33
WR D2 Profiling Prominent Ransomware Threat Actors
23:55
WR D2 Assessing the Content and Coverage of Cyber Security Degrees
21:51
Data sharing, fabric and effective governance in the error of big data analytics
42:09
Susan McConnell (Stanford): Designing effective scientific presentations
9:34