?
Innovations for Community Services; Communications in Computer and Information Science ,
1
Scared? Prepared? Toward a Ransomware Incident Response Sce..:
, In:
?
Innovations for Community Services; Communications in Computer and Information Science ,
2
COPYCAT: Applying Serious Games in Industry for Defending S..:
, In:
?
Innovations for Community Services; Communications in Computer and Information Science ,
3
Operation Raven: Design of a Cyber Security Incident Respon..:
, In:
?
Innovations for Community Services; Communications in Computer and Information Science ,
4
Digital Sovereignty and Open-Source Software - A Discussion..:
, In:
?
Innovations for Community Services; Communications in Computer and Information Science ,
5
Greenhouse Gas Emissions as Commons: A Community Service Ap..:
, In:
?
Proceedings of the 19th International Conference on Availability, Reliability and Security ,
6
NEWSROOM: Towards Automating Cyber Situational Awareness Pr..:
, In:
?
Innovations for Community Services; Communications in Computer and Information Science ,
8
The Digital Product Passport: Enabling Interoperable Inform..:
, In:
?
Design Science Research for a Resilient Future; Lecture Notes in Computer Science ,
9
Augmenting Frontline Service Employee Onboarding via Hybrid..:
, In:
?
2024 IEEE/SICE International Symposium on System Integration (SII) ,
10
Blockchain-Based Monitoring, Reporting and Verification of ..:
, In:
?
Information Systems; Lecture Notes in Business Information Processing ,
11
How Blockchain and Artificial Intelligence influence Digita..:
, In:
?
2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) ,
12
CarbonEdge: Demonstrating Blockchain-Based Monitoring, Repo..:
, In:
?
Proceedings of the 5th European Conference on Software Engineering Education ,
13
Reflections on Training Next-Gen Industry Workforce on Secu..:
, In:
?
Critical Information Infrastructures Security; Lecture Notes in Computer Science ,
14
Towards a Layer Model for Digital Sovereignty: A Holistic A..:
, In:
?
Communications in Computer and Information Science; Ubiquitous Security ,
15