WR D2 Assessing the Content and Coverage of Cyber Security Degrees
21:34
2.2: Using artificial intelligence techniques to standardize intelligent and automated generation...
22:58
1.2: Privacy and Legal Implications Regarding the Processing of Honeypot Data
30:43
WR D2 Contextual Factors Influencing the Cybersecurity Commitment of Government Institutions in Deve
26:59
2.4: Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock
22:09
WR D2 A Rapid Review Cybersecurity Strategic Analysis Framework
22:07
WR D2 Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals
2:04:14
Afternoon Keynote Talks
16:27