Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 20976 results:
RTF
EndNote XML
20212
Sadiku, Matthew N. O.
,
Kelechi G. Eze
, and
Sarhan M. Musa
.
Blockchain in Agriculture
In
Information & Security: An International Journal
. Vol. 49., 20212.
Google Scholar
RTF
EndNote XML
20014
Posner, Eric
.
The 1997 Black Sea Fleet Agreement between Russia and Ukraine
., 20014.
Google Scholar
RTF
EndNote XML
In Press
"
Editorial
."
Information & Security: An International Journal
30, no. 1 (In Press): 1-10.
Google Scholar
RTF
EndNote XML
2104
O., Ivanchenko
,
V. Kharchenko
,
B. Moroz
,
L. Kabak
,
K. Smoktii
, and
Ponochovnyi Y.
.
Availability as a Cloud Service for Control System of Critical Energy Infrastructure
In
CEUR Workshop Proceedings
., 2104.
Google Scholar
RTF
EndNote XML
2022
Ottuh, John Arierhi
.
"
The 3Cs of Colonisation and their Impacts on African Slavery: The Nigeria’s Experience
."
Black Theology: An International Journal
20, no. 1 (2022).
Google Scholar
RTF
EndNote XML
Shrivastava, Tanya
, and
Bharat Bhushan
.
"
5 Blockchain-Based Cybersecurity Solutions for Industry 4.0 Applications
." In
Artificial Intelligence and Cybersecurity: Advances and Innovations
, 69., 2022.
Google Scholar
RTF
EndNote XML
Jano, Dorian
.
"
Albania Moving from Security Receiver to Security Provider
." In
Peace and Security in the Western Balkans: A Local Perspective
. Taylor & Francis, 2022.
Google Scholar
RTF
EndNote XML
Ostrovsky, Aaron
.
Applying Defense-In-Depth to Defend Against Russian State-Sponsored Disinformation Campaigns
. Vol. Master of Science in Cybersecurity. Utica University, 2022.
Google Scholar
RTF
EndNote XML
Yaman, Fuat
.
Applying Machiavellian Discourses to Russian Hybrid Warfare
In
Graduate School of Social Sciences
. Vol. Master of Arts. Middle East Technical University, 2022.
Google Scholar
RTF
EndNote XML
Jażdżewska-Gutta, Magdalena
, and
Przemysław Borkowski
.
"
As strong as the weakest link. Transport and supply chain security
."
Transport Reviews
(2022).
Google Scholar
RTF
EndNote XML
Qiao, Dalei
,
Guangzhong Liu
,
Wei Li
,
Taizhi Lyu
, and
Juan Zhang
.
"
Automated Full Scene Parsing for Marine ASVs Using Monocular Vision
."
Journal of Intelligent & Robotic Systems volume
104 (2022).
Google Scholar
RTF
EndNote XML
Pandey, Vimal Nayan
.
"
Changing Dimensions of Global Terror in the Twenty-First Century: India’s Strategy and Response
." In
Nontraditional Security Concerns in India
. Singapore: Palgrave Macmillan, 2022.
Google Scholar
RTF
EndNote XML
Mygal, Valeriy
,
Galyna Mygal
, and
Stanislav Mygal
.
"
Cognitive Space for Online and Offline Learning: A Convergent Approach
."
The Educational Review, USA
6, no. 4 (2022): 109-123.
Google Scholar
RTF
EndNote XML
Bhatia, Deepshikha
.
"
A Comprehensive Review on the Cyber Security Methods in Indian Organisation
."
Int. J. Advance Soft Compu. Appl,
14, no. 1 (2022).
Google Scholar
RTF
EndNote XML
Koivisto, Jouni
,
Risto Ritala
, and
Matti Vilkko
.
"
Conceptual model for capability planning in a military context – A systems thinking approach
."
Systems Engineering
(2022): 1-18.
Google Scholar
RTF
EndNote XML
Lawniczak, Brent A.
.
Confronting the Myth of Soft Power in U.S. Foreign Policy
. Rowman & Littlefield, 2022.
Google Scholar
RTF
EndNote XML
Lukichev, P. N.
, and
A. A. Ali
.
"
Consciousness Management by Extremist Organizations With the Means of Internet Communication
."
Humanities of the South of Russia
11 (54), no. 2 (2022).
Google Scholar
RTF
EndNote XML
Moon, Bo Ra
,
Seung Min Lee
, and
Won Jae Seo
.
"
Contemporary Safety Management of Virtual Golf in South Korea
."
Journal of Sport and Applied Science
6, no. 1 (2022): 01-04.
Google Scholar
RTF
EndNote XML
Ivantsov, Sergey Vyacheslav
, and
Aleksey Valeryevic Saranov
.
"
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States
."
All-Russian Criminological Journal
16, no. 1 (2022): 57-72.
Google Scholar
RTF
EndNote XML
Liebetrau, Tobias
.
"
Cyber conflict short of war: a European strategic vacuum
."
European Security
(2022).
Google Scholar
RTF
EndNote XML
Fischerkeller, Michael P.
,
Emily O. Goldman
, and
Richard J. Harknett
.
Cyber Persistence Theory: Redefining National Security in Cyberspace
. Oxford University Press, 2022.
Google Scholar
RTF
EndNote XML
Ben Farah, Mohamed Amine
,
Elochukwu Ukwandu
,
Hanan Hindy
,
David Brosset
,
Miroslav Bures
,
Ivan Andonovic
, and
Xavier Bellekens
.
"
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends
."
Information
13, no. 22 (2022).
DOI
Google Scholar
RTF
EndNote XML
Ungkap, Pana
, and
Therdpong Daengsi
.
"
Cybersecurity Awareness Modeling Associated with Influential Factors Using AHP Technique: A Case of Railway Organizations in Thailand
." In
2022 International Conference on Decision Aid Sciences and Applications (DASA)
. Chiangrai, Thailand, 2022.
Google Scholar
RTF
EndNote XML
Herath, Thilini B. G.
,
Prashant Khanna
, and
Monjur Ahmed
.
"
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
."
Journal of Cybersecurity and Privacy
2 (2022): 1-18.
Google Scholar
RTF
EndNote XML
Wirawan, Deny
,
Budi Pramono
, and
Triyoga Budi Prasetyo
.
"
Defense Diplomacy Strategy in Handling Transnational Crimes at the Sea Borders of Indonesia – Malaysia – Filipina
."
International Journal of Social Science And Human Research
05, no. 02 (2022).
Google Scholar
RTF
EndNote XML
Pages
1
2
3
4
5
6
7
8
9
…
next ›
last »
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance