|
Secure web application development and global regulation |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2007 |
|
Privacy and Data Protection in Cyberspace in Indian Environment |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
|
A Generic Framework for Network Forensics |
Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
|
Tracing the Origins of Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
New Strategy for Detecting Intrusion by Using c4.5 Algorithm |
Technical Solutions |
Governance, Industry |
2012 |
|
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
Comprehensive Security Framework for Global Threats Analysis |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2009 |
|
Security in Cyberspace: Combatting Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
|
A functional Method for Assessing Protocol Implementation Security |
Technical Solutions |
Industry |
2001 |
|
Systematic Digital Forensic Investigation Model |
Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
|
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
|
Data Security: An Analysis |
Activities, Technical Solutions |
Industry |
2010 |
|
Modeling Human Behavior to Anticipate Insider Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
|
Non-Security – Premise of Cybercrime |
Activities, Technical Solutions |
Industry |
2012 |
|
Global tendencies and local implications: cyber exclusion of and within Western Balkan countries |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2006 |
|
Data Access in a Cyber World: Making Use of Cyberinfrastructure |
Technical Solutions, Social Solutions |
Industry |
2008 |
|
Improved Support Vector Machine for Cyber Attack Detection |
Technical Solutions |
Industry |
2011 |
|
Specification, Analyzing Challenges and Approaches for Cyber-Physical Systems (CPS) |
Technical Solutions |
Governance, Industry |
2010 |
|
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
|
XXI An Odyssey in Cyberspace: A Preliminary Look at Cyber-Feminism |
Activities, Technical Solutions, Social Solutions |
Industry |
2008 |
|
Cyber Security in Internet-Based Multiplayer Gaming |
Activities, Technical Solutions |
Industry |
2010 |
|
Cyber-Physical-Social Based Security Architecture for Future Internet of Things |
Technical Solutions, Social Solutions |
Industry |
2012 |
|
Cyber Cheating in an Information Technology Age |
Activities, Technical Solutions |
Industry |
2008 |
|
Towards Co-Engineering Communicating Autonomous Cyber-physical Systems |
Technical Solutions |
Industry |
2009 |
|
e-Government Ethics: a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics |
Activities, Problems, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
|
Study of Indian Banks Websites for Cyber Crime Safety Mechanism |
Activities, Technical Solutions |
Governance, Industry |
2011 |
|
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
|
Evaluation of Vulnerability Assessment in System From Hackers in Cyber Security |
Activities, Technical Solutions |
Governance, Industry |
2010 |
|
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
|
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |
|
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
|
Cyber Threats in Social Networking Websites |
Technical Solutions, Social Solutions |
Industry |
2012 |
|
Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
|
A Study on Cyber Crimes and Protection |
Technical Solutions, Social Solutions |
Conflicts, Industry |
2011 |
|
Establishing Cyber Warfare Doctrine |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2012 |
|
COnnecting REpositories (CORE) |
Technical Solutions |
Industry |
2013 |
|
Addressing Cyber Instability |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
|
Depleted Trust in the Cyber Commons |
Activities, Technical Solutions, International Responses |
Governance, Industry |
2013 |
|
National Cyber Security Framework Manual |
International Responses |
Conflicts, Governance, Industry |
2012 |
|
UNESCO Science and Technology Policy Forums Handout |
Technical Solutions, International Responses |
Governance, Industry |
2013 |
|
UNESCO Science for Peace and Development |
Problems, Technical Solutions, International Responses |
Energy, Governance, Industry |
2013 |
|
UNESCO Science Policy for Sustainable Development |
Problems, Technical Solutions, International Responses |
Governance, Industry |
2010 |
|
Influence of urbanization of the western coast of the of the United Arab Emirates on trace metal content in muscle and liver of wild Red-spot emperor (Lethrinus lentjan) |
Activities, Problems |
Population, Urbanization |
2013 |
|
Pollution Scenarios through Atmospheric Dispersion Modelling Based on Real Measurements of Selected Urban Areas in Abu Dhabi, UAE |
Activities, Problems |
Consumption, Energy, Population, Urbanization, Water |
2013 |
|
Intensification of rangeland grazing in an oil-rich state; causes, consequences and possible solutions |
Problems |
Urbanization |
2013 |
|
Towards the establishment of water management in Abu Dhabi Emirate |
Activities, Problems |
Agriculture, Population, Urbanization, Water |
2013 |