Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Conference

How the United States Constructs Cyber-Threat Scenarios.

  • Source: Proceedings of the International Conference on Cyber Warfare & Security; 2019, p361-368, 8p

Record details

×
Conference

Improving Phishing Awareness in the United States Department of Defense.

  • Source: Proceedings of the European Conference on Cyber Warfare & Security; 2019, p172-177, 6p

Record details

×
Conference

Protecting Health Information Privacy and Safety on the Internet: United States eHealth Systems and Legal Perspectives.

  • Source: Proceedings of the International Conference on Information Warfare & Security; 2012, p122-129, 8p, 1 Chart

Record details

×
Conference

Cablegate Analysis of Likely Espionage of Nokia by the United States.

  • Source: Proceedings of the European Conference on Information Warfare & Security; 2012, p258-264, 7p, 2 Diagrams

Record details

×
Conference

Risk Characterization, Assessment, Management and Mitigation in United States Federal e-Government Initiatives.

  • Source: Proceedings of the International Conference on e-Government; 2009, p15-23, 9p, 11 Charts, 1 Graph

Record details

×
  • 1-10 of  16 results for ""United States""