Operational levels-of-cyber-intelligence
Alison Knight Poster Industry Forum 2013 Latest
CSIAC - Social Media Analysis and Privacy
Measuring Serendipity: Connecting People, Locations and Interests in a Mobile 3G Network Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio.
Electronic Warfare for Cyber Warriors
(2009)Psychologist George Brander DTIO-TIO DSTL Targeted Individuals in Information Operations
Dr Raymond Choo, Cloud Security Alliance - Mobile devices and their implications for forensic investigations in Australia
Crim cybersecurity_jarno_limnéll
National Guard-Reserve in Cyber Mission Force.pdf
1 Military Operations Research Society (MORS) Cyber Analysis Workshop Online Plenary Session 21 October 2008 Whitney, Bradley, & Brown (WBB) Consulting,
The Indispensable Component of Cyber Security: The Dynamics of an Effective Cyber Cooperation Prof. Nazife Baykal Director of METU Informatics Institute.
“White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary.