Security at the End of the Tunnel
In this paper, we present a first explorative study of eleven experts’ and seven non-experts’ mental models in the context...
In this paper, we present a first explorative study of eleven experts’ and seven non-experts’ mental models in the context...
In this work, we extensively examine the relevant literature on cybersecurity insurance, research and practice, in order to draft the...
In this work we present a method for the measurement of tracking in the web through a browser extension, as...
Here we report on the Best Footprint Forward project which utilised focus groups to investigate the digital footprint awareness of...
This report examines the potential use of mobile device biometrics by first responders and discusses the challenges in detail.
This is the third in a series of reports on ongoing face recognition vendor tests (FRVT) executed by the National...
The Privacy Framework is intended to help organizations build better privacy foundations by bringing privacy risk into parity with their...
The study found that hacking/IT incidents are the most prevalent forms of attack behind healthcare data breaches, followed by unauthorized...
Healthcare facilities should have a disaster plan with adequate data backups and educate employees who are the usual sources of...
In this paper we use techniques for security purposes, in detecting, preventing and predicting cyber-attacks on virtual space.
Security through data
© 2023 | CyberMaterial | All rights reserved.
World’s #1 Cybersecurity Repository
© 2022 Cybermaterial - Security Through Data .