Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21204 results:
RTF
EndNote XML
20212
Sadiku, Matthew N. O.
,
Kelechi G. Eze
, and
Sarhan M. Musa
.
Blockchain in Agriculture
In
Information & Security: An International Journal
. Vol. 49., 20212.
Google Scholar
RTF
EndNote XML
20014
Posner, Eric
.
The 1997 Black Sea Fleet Agreement between Russia and Ukraine
., 20014.
Google Scholar
RTF
EndNote XML
In Press
"
Editorial
."
Information & Security: An International Journal
30, no. 1 (In Press): 1-10.
Google Scholar
RTF
EndNote XML
2104
O., Ivanchenko
,
V. Kharchenko
,
B. Moroz
,
L. Kabak
,
K. Smoktii
, and
Ponochovnyi Y.
.
Availability as a Cloud Service for Control System of Critical Energy Infrastructure
In
CEUR Workshop Proceedings
., 2104.
Google Scholar
RTF
EndNote XML
2023
Nyarko, Diana Adjei
, and
Rose Cheuk-wai Fong
.
"
Cyber Security Compliance Among Remote Workers
." In
Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications
, 343-369. Cham: Springer, 2023.
Google Scholar
RTF
EndNote XML
Feng, Hailin
,
Dongliang Chen
,
Haibin Lv
, and
Zhihan Lv
.
"
Game theory in network security for digital twins in industry
."
Digital Communications and Networks
(2023).
Google Scholar
RTF
EndNote XML
Carbonaro, Antonella
.
Interpretability of AI Systems in Electronic Governance
In
International Conference on Electronic Governance with Emerging Technologies, EGETC 2022: Electronic Governance with Emerging Technologies
., 2023.
Google Scholar
RTF
EndNote XML
Csata, Zsombor
,
Betty Compton
,
Amy H. Liu
, and
Attila Papp Z
.
"
Linguistic diversity in media and state language proficiencies: evidence from Hungarian minority regions in central-Eastern Europe
."
Regional & Federal Studies
(2023).
Google Scholar
RTF
EndNote XML
Bazalgette, Didier
.
"
Opérations cognitives: Les sciences et neurosciences cognitives au service de l’action stratégique
."
DSI (Défense et Sécurité Internationale) DSI (Défense et Sécurité Internationale)
163 (2023): 92-97.
Google Scholar
RTF
EndNote XML
Arjona, Rosario
,
Paula López-González
,
Roberto Román
, and
Iluminada Baturone
.
"
Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece
."
Applied Sciences
13, no. 2 (2023).
Google Scholar
RTF
EndNote XML
2022
Ottuh, John Arierhi
.
"
The 3Cs of Colonisation and their Impacts on African Slavery: The Nigeria’s Experience
."
Black Theology: An International Journal
20, no. 1 (2022).
Google Scholar
RTF
EndNote XML
Shrivastava, Tanya
, and
Bharat Bhushan
.
"
5 Blockchain-Based Cybersecurity Solutions for Industry 4.0 Applications
." In
Artificial Intelligence and Cybersecurity: Advances and Innovations
, 69., 2022.
Google Scholar
RTF
EndNote XML
Jano, Dorian
.
"
Albania Moving from Security Receiver to Security Provider
." In
Peace and Security in the Western Balkans: A Local Perspective
. Taylor & Francis, 2022.
Google Scholar
RTF
EndNote XML
Herranen, Matias
.
Analysis of E-skills Found in Job Postings
In
Safety, Security and Risk Management
. Vol. Bachelor of Business Administration. Laurea University of Applied Sciences , 2022.
Google Scholar
RTF
EndNote XML
Laksmi, Sylvia Windya
.
An Analysis of Government Capabilities in Countering Terrorist Financing in Indonesia
. Vol. Doctor of Philosophy. Australian National University, 2022.
Google Scholar
RTF
EndNote XML
Dimitrov, Michael Minev
.
"
Analysis of strategic stakeholders in the Western Balkans
."
Security and Defence Quarterly
(2022).
Google Scholar
RTF
EndNote XML
Petrova, Valentina Markova
.
Analytical hierarchical process for assessment and selection of secure software solutions
. Varna, Bulgaria: Nikola Vaptsarov Naval Academy , 2022.
Google Scholar
RTF
EndNote XML
Ostrovsky, Aaron
.
Applying Defense-In-Depth to Defend Against Russian State-Sponsored Disinformation Campaigns
. Vol. Master of Science in Cybersecurity. Utica University, 2022.
Google Scholar
RTF
EndNote XML
Yaman, Fuat
.
Applying Machiavellian Discourses to Russian Hybrid Warfare
In
Graduate School of Social Sciences
. Vol. Master of Arts. Middle East Technical University, 2022.
Google Scholar
RTF
EndNote XML
Iliev, Iliyan
, and
Ivan Blagoev
.
"
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
."
Information & Security: An International Journal
53, no. 1 (2022): 78-88 .
DOI
Google Scholar
RTF
EndNote XML
Mygal, Valeriy
,
Galyna Mygal
, and
Stanislav Mygal
.
"
Artificial intelligence as the cognitive value of heuristic models
."
Radioelectronic and Computer Systems
2 (2022).
Google Scholar
RTF
EndNote XML
Jażdżewska-Gutta, Magdalena
, and
Przemysław Borkowski
.
"
As strong as the weakest link. Transport and supply chain security
."
Transport Reviews
(2022).
Google Scholar
RTF
EndNote XML
Qiao, Dalei
,
Guangzhong Liu
,
Wei Li
,
Taizhi Lyu
, and
Juan Zhang
.
"
Automated Full Scene Parsing for Marine ASVs Using Monocular Vision
."
Journal of Intelligent & Robotic Systems volume
104 (2022).
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
The ‘Balance’ As a Panacea for Achieving (Cyber)Security
In
IT4Sec Reports
., 2022.
DOI
Google Scholar
RTF
EndNote XML
Shay, Shaul
.
"
Between Kiev and Venice - The Cognitive Warfare and the Biennale of Venice
."
Security Science Journal
2 (2022).
Google Scholar
RTF
EndNote XML
Pages
1
2
3
4
5
6
7
8
9
…
next ›
last »
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance