中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_13
W. S. Leung
{"title":"Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings","authors":"W. S. Leung","doi":"10.1007/978-3-030-59291-2_13","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_13","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"19 1","pages":"184 - 197"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75901640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_6
A. Vybornov, N. Miloslavskaya, A. Tolstoy
{"title":"Designing Competency Models for Cybersecurity Professionals for the Banking Sector","authors":"A. Vybornov, N. Miloslavskaya, A. Tolstoy","doi":"10.1007/978-3-030-59291-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_6","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"8 1","pages":"81 - 95"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90210140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_2
Erik L. Moore, Daniel M. Likarish, Bobbie Bastian, Michael Brooks
{"title":"An Institutional Risk Reduction Model for Teaching Cybersecurity","authors":"Erik L. Moore, Daniel M. Likarish, Bobbie Bastian, Michael Brooks","doi":"10.1007/978-3-030-59291-2_2","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_2","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"71 1","pages":"18 - 31"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84135922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_3
S. Furnell, M. Bishop
{"title":"Education for the Multifaith Community of Cybersecurity","authors":"S. Furnell, M. Bishop","doi":"10.1007/978-3-030-59291-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_3","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"27 1","pages":"32 - 45"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87903935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_4
S. Fischer-Hübner, Matthias Beckerle, Alberto Lluch-Lafuente, A. Ruiz-Martínez, Karo Saharinen, A. Gómez-Skarmeta, Pierantonia Sterlini
{"title":"Quality Criteria for Cyber Security MOOCs","authors":"S. Fischer-Hübner, Matthias Beckerle, Alberto Lluch-Lafuente, A. Ruiz-Martínez, Karo Saharinen, A. Gómez-Skarmeta, Pierantonia Sterlini","doi":"10.1007/978-3-030-59291-2_4","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_4","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"26 1","pages":"46 - 60"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72669075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_7
Anzel Berndt, Jacques Ophoff
{"title":"Exploring the Value of a Cyber Threat Intelligence Function in an Organization","authors":"Anzel Berndt, Jacques Ophoff","doi":"10.1007/978-3-030-59291-2_7","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_7","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"237 1","pages":"96 - 109"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73960927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_12
F. Blauw
{"title":"Enlivening Port Scanning Exercises with Capture the Flag and Deduction","authors":"F. Blauw","doi":"10.1007/978-3-030-59291-2_12","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_12","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"21 1","pages":"170 - 183"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74445034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
中国信息安全Pub Date : 2020-08-16DOI: 10.1007/978-3-030-59291-2_1
Konstantin Knorr
{"title":"Learning and Grading Cryptology via Automated Test Driven Software Development","authors":"Konstantin Knorr","doi":"10.1007/978-3-030-59291-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_1","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"111 1","pages":"3 - 17"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77880686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}