LEARNING TO PROTECT COMMUNICATIONS WITH ADVERSARIAL NEURAL CRYPTOGRAPHY |
Technical Solutions |
Industry |
2018 |
Cyber risk from a chief risk officer perspective |
Technical Solutions |
Governance, Industry, Trade |
2018 |
A Digital Geneva Convention?: The Role of the Private Sector in Cybersecurity |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
“Public-private partnerships in national cyber-security strategies” |
Activities, Technical Solutions |
Governance, Industry |
2018 |
I’m harvesting credit card numbers and passwords from your site. Here’s how. |
Activities, Social Solutions |
Trade |
2018 |
A Chinese Perspective on the Pentagon’s Cyber Strategy: From ‘Active Cyber Defense’ to ‘Defending Forward' |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures |
Technical Solutions |
Industry |
2018 |
Why Blockchain Will Fundamentally Change Corporate Finance |
Technical Solutions |
Industry, Trade |
2018 |
TOWARDS A SUSTAINABLE URBAN FUTURE IN OMAN:PROBLEM & PROCESS ANALYSIS (MUSCAT AS A CASE STUDY) |
Problems |
Urbanization |
2018 |
Cyber Warfare and Sino-American Crisis Instability |
Activities |
Conflicts |
2018 |
Local Governments for Sustainability |
Problems, Social Solutions |
Governance, Urbanization |
2018 |
Sustainable Development Goals (SDGs): Egypt 2030 |
Social Solutions |
Energy, Governance, Population |
2018 |
Takeaways From the Latest Russian Hacking Indictment |
Social Solutions, International Responses |
Governance |
2018 |
The Untold Story of NotPetya, the Most Devastating Cyberattack in History |
Social Solutions |
Industry |
2018 |
EXPLAINING AND HARNESSING ADVERSARIAL EXAMPLES |
Technical Solutions |
Unmet Needs |
2018 |
Public international law of the international telecommunication instruments: cyber security treaty provisions since 1850 |
International Responses |
Conflicts, Governance |
2018 |
Decoding the Bombshell Story for China |
Activities, Social Solutions |
Conflicts, Governance |
2018 |
UNEP Risoe CDM/JI Pipeline Analysis and Database |
Problems, International Responses |
Energy, Land Use, Water |
2018 |
Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Thermonuclear cyberwar |
Activities, Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2018 |
Sustainable Development Goals of Zimbabwe |
Activities, Problems, Social Solutions, International Responses |
Agriculture, Governance, Population, Unmet Needs, Urbanization |
2018 |
Cyber Deterrence: A Comprehensive Approach? |
Activities, Technical Solutions, Social Solutions |
Conflicts |
2018 |
AV-Test Security Report 2016/2017 |
Problems |
Industry |
2018 |
A Digital Geneva Convention to Protect Cyberspace |
Social Solutions |
Governance, Industry |
2018 |
Tech Firms Sign ‘Digital Geneva Accord’ Not to Aid Governments in Cyberwar |
Technical Solutions |
Conflicts, Governance |
2018 |
The Prospects of Sustainable Desert Agriculture to Improve Food Security in Oman |
Problems |
Agriculture |
2018 |
Towards an Education Campaign for Fostering a Societal, Cyber Security Culture |
Activities |
Governance |
2018 |
National Snow and Ice Data Center |
Activities, Problems, Technical Solutions |
Energy |
2018 |
The Truth About Machine Learning in Cybersecurity: Defense |
Technical Solutions |
Industry |
2018 |
The Ancient History of Bitcoin |
Technical Solutions |
Governance, Trade |
2018 |
Using Offline Activities to Enhance Online Cybersecurity Education |
Social Solutions |
Industry |
2018 |
Analyzing the Great Firewall of China Over Space and Time |
Technical Solutions, Social Solutions |
Governance |
2018 |
Zero Waste Sustainability- A New Way of Living |
Social Solutions |
Consumption, Governance |
2018 |
Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms |
Social Solutions, International Responses |
Industry |
2018 |
Taiwan Heist: Lazarus Tools and Ransomware |
Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2018 |
Sustainability of Population Growth |
Social Solutions |
Migration, Population |
2018 |
Open School of Sustainable Development (for Russian-speaking) |
Problems, Social Solutions |
Governance, Urbanization |
2018 |
Why Cybersecurity Is About More Than Prevention-Focused Products |
Technical Solutions |
Governance |
2018 |
Cybersecurity for the Nation: Workforce Development |
Social Solutions |
Industry |
2018 |
Surveillance Self-Defense |
Activities |
Governance |
2018 |
NSF Arctic Data Center |
Activities, Problems |
Consumption, Energy, Water |
2018 |
Uber covered up a cyberattack last year that exposed data of 57 million riders and drivers |
Technical Solutions, Social Solutions |
Industry |
2017 |
The Brundtland report: 'Our common future' |
Social Solutions, International Responses |
Consumption, Energy |
2017 |
International trade drives biodiversity threats in developing nations |
Activities, Problems |
Agriculture, Consumption, Land Use, Trade |
2017 |
The Arab Recycling Initiative, The Big Tree Society and Tarsheed Qatar |
Social Solutions |
Energy, Industry, Water |
2017 |
Management of Southern Ocean fisheries: global forces and future sustainability |
Activities, Problems, Social Solutions |
Governance, Water |
2017 |
Growing Greener Cities: Mexico City |
Problems |
Agriculture, Land Use, Water |
2017 |
Designing monitoring arrangements for collaborative learning about adaptation pathways |
Social Solutions |
Governance |
2017 |
Toward a national sustainable building assessment system in Oman: Assessment categories and their performance indicators |
Problems, Technical Solutions |
Urbanization |
2017 |
Sustainability of water resources for agriculture considering grain production, trade and consumption in China from 2004 to 2013 |
Problems, Technical Solutions, Social Solutions |
Agriculture, Consumption, Population, Water |
2017 |