Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 54 results:
RTF
EndNote XML
Filters:
Author
is
ISIJ Monitor
[Clear All Filters]
2003
Monitor, ISIJ
.
"
Modeling and Simulation Internet Sources
."
Information & Security: An International Journal
12, no. 2 (2003): 261-275.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Police Action against the Threat of Special Weapons of Mass Destruction Chemical and Biological Weapons Terrorism: Forging a Response
."
Information & Security: An International Journal
10 (2003): 116-117.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Selected Internet Sources on Civil Emergency and Law Enforcmenet Issues
."
Information & Security: An International Journal
10 (2003): 126-134.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Total Information Awareness (DARPA’s Research Program)
."
Information & Security: An International Journal
10 (2003): 105-109.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Transparency in Reforming the National Security Sector in Transition Countries
."
Information & Security: An International Journal
11 (2003): 167-170.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Transparency-building in the Security Sector
."
Information & Security: An International Journal
11 (2003): 171-172.
DOI
Google Scholar
RTF
EndNote XML
2002
Monitor, ISIJ
.
"
Center of excellence for Education, Science & Technology in 21 Century (BIS-21)
."
Information & Security: An International Journal
9 (2002): 180-182.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
E-Comerce Laboratory, Plovdiv University, Bulgaria
."
Information & Security: An International Journal
8, no. 2 (2002): 255-256.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
In memoriam
."
Information & Security: An International Journal
9 (2002): 177-179.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Multi-agent systems in defense and security: Research projects, systems, and software tools
."
Information & Security: An International Journal
8, no. 1 (2002): 104-115.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Multi-agent Systems research: General research - on-line resources
."
Information & Security: An International Journal
8, no. 1 (2002): 101-103.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Work Package: Real-time Data Processing in Adaptive Sensor Interfaces
."
Information & Security: An International Journal
9 (2002): 183-184.
DOI
Google Scholar
RTF
EndNote XML
2001
Monitor, ISIJ
.
"
Center for National Security and Defense Research
."
Information & Security: An International Journal
6 (2001): 167-169.
DOI
Google Scholar
RTF
EndNote XML
2000
Monitor, ISIJ
.
"
Center for Security Studies and Conflict Research
."
Information & Security: An International Journal
7 (2000): 177-188.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Information Assurance Challenges
."
Information & Security: An International Journal
5 (2000): 131-132.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
The Information Revolution and Post-Modern Warfare
."
Information & Security: An International Journal
5 (2000): 127-128.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Information Security Architecture: An Integrated Approach to Security in the Organization
."
Information & Security: An International Journal
4 (2000): 116.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Information Security Management Handbook
."
Information & Security: An International Journal
4 (2000): 117-120.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Information Warfare and Security
."
Information & Security: An International Journal
4 (2000): 113-115.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
LAN Times Guide to Security and Data Integrity
."
Information & Security: An International Journal
4 (2000): 123-124.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Network Intrusion Detection: An Analyst’s Handbook
."
Information & Security: An International Journal
4 (2000): 125-146.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Network Security Fundamentals
."
Information & Security: An International Journal
4 (2000): 121-122.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
New AFCEA Chapter in South-East Europe
."
Information & Security: An International Journal
5 (2000): 129-130.
DOI
Google Scholar
RTF
EndNote XML
1999
Monitor, ISIJ
.
"
Information warfare principles and operations
."
Information & Security: An International Journal
2 (1999): 141-157.
DOI
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Library Update 2
."
Information & Security: An International Journal
3 (1999): 193-195.
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance