data security
http://www.yso.fi/onto/yso/p5479
Related people
Related publications and other outputs
- Defensive Machine Learning Methods and the Cyber Defence Chain (2023) Turtiainen, Hannu; et al.; A3; 978-3-031-15030-2
- Do SETA Interventions Change Security Behavior? : A Literature Review (2023) Nwachukwu, Uchechukwu; et al.; A4; OA; 978-0-9981331-6-4
- HyperIO : A Hypervisor-Based Framework for Secure IO (2023) Kiperberg, Michael; et al.; A1; OA
- Information security policy development : considering the practices of making rules (2023) Paananen, Hanna; G4; OA; 978-951-39-9297-2
- Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity (2023) Shaikh, Faheem Ahmed; et al.; A1; OA
- Offensive Machine Learning Methods and the Cyber Kill Chain (2023) Turtiainen, Hannu; et al.; A3; 978-3-031-15030-2
- On Attacking Future 5G Networks with Adversarial Examples : Survey (2023) Zolotukhin, Mikhail; et al.; A1; OA
- Organizational Learning from Cybersecurity Performance : Effects on Cybersecurity Investment Decisions (2023) Shaikh, Faheem Ahmed; et al.; A1; OA
- Seeking Rhetorical Validity in Fear Appeal Research : An Application of Rhetorical Theory (2023) Johnston, Allen; et al.; A1
- Accessible authentication : Assessing the applicability for users with disabilities (2022) Furnell, Steven; et al.; A1; OA