Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2018
Severin, Thorsten
, and
Andrea Shalal
.
"
German Government under Cyber Attack, Shores up Defenses
(link is external)
."
Reuters
(2018).
Google Scholar
(link is external)
RTF
EndNote XML
Ivashov, Leonid
.
"
Gibridnye voinyi [Hybrid Wars]
(link is external)
."
Izborskiy Klub
(2018).
Google Scholar
(link is external)
RTF
EndNote XML
International Telecommunication Union(ITU)
.
The Global Cybersecurity Index
(link is external)
., 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Henman, Matthew
.
Global Militant Attacks Caused Fewer Fatalities in 2017
(link is external)
. IHS Markit, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
International Telecommunication Union
.
Global Partnerships with Industry Players
(link is external)
., 2018.
Google Scholar
(link is external)
RTF
EndNote XML
The Global State of Information Security® Survey 2018
(link is external)
. Official site PricewaterhouseCoopers - Access Mode, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Depo, Bogdana
.
Goliath Versus Goliath: EU Democracy Promotion in the Eastern Neighbourhood and Russia’s Alternative Agenda
. Vol. PhD Thesis., 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Blokdyk, Gerardus
.
Google Classroom Complete Self-Assessment Guide
. 5STARCooks, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
I.M., Skierka
.
"
The Governance of Safety and Security Risks in Connected Healthcare
." In
Living in the Internet of Things: Cybersecurity of the IoT
. London, UK, 2018.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
R., Rondelez
.
"
Governing Cyber Security through Networks: An Analysis of Cyber Security Coordination in Belgium
."
International Journal of Cyber Criminology
12, no. 1 (2018): 300-315.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Government decision 3611: Promoting national capacity in cyber space
. Jerusalem, Israel: PMO Secretariat, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
University of Zagreb
.
Graduate Study Program in Military Engineering and Military Leadership and Management
. Zagreb: University of Zagreb, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Gaddis, John Lewis
.
On Grand Strategy
. New York: Penguin Press, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Savchuk, Vlada
.
"
Graphic Model of The Target Audience of Psychological Influence in Social Networks
."
Information & Security: An International Journal
41 (2018): 81-93.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
GreyEnergy: A Successor to BlackEnergy
(link is external)
In
White Paper
., 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Meyer, Robinson
.
The Grim Conclusions of the Largest-Ever Study of Fake News: Falsehoods almost always beat out the truth on Twitter, penetrating further, faster, and deeper into the social network than accurate information
(link is external)
. The Atlantic, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Korsemov, Dilian
,
Daniela Borissova
, and
Ivan Mustakerov
.
"
Group Decision Making for Selection of Supplier under Public Procurement
." In
ICT Innovations 2018. Engineering and Life Sciences. ICT 2018. Communications in Computer and Information Science
. Vol. 940., 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Borissova, Daniela
.
"
A group decision making model considering experts competency: An application in personnel selections
."
Comptes rendus de l’Academie Bulgare des Sciences
71, no. 11 (2018): 1520-1527.
Google Scholar
(link is external)
RTF
EndNote XML
Guía Metodológica para la Proyección de Financiación de Capacidades
. Vol. v.1.0 . Bogotá, Colombia: Ministerio de Defensa Nacional, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
A Guide to IoT: Security Basics
(link is external)
. CSO , 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Board, European Data Prote
.
Guidelines 3/2018 on the Territorial Scope of the GDPR (Article 3) - Version for Public Consultation
(link is external)
. Vol. 19., 2018.
Google Scholar
(link is external)
RTF
EndNote XML
The guidelines on cybersecurity onboard ships
(link is external)
In
version 3
. BIMCO, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Stubbs, Jack
.
Hackers Accused of Ties to Russia Hit Three East European Companies: Cybersecurity Firm
(link is external)
. Reuters, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Munro, Ken
.
Hacking, tracking, stealing and sinking ships
(link is external)
. Pen Test Partners, Blog: Maritime Cyber Security, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Popescu, Nicu
, and
Stanislav Secrieru
.
Hacks, Leaks and Disruptions: Russian Cyber Strategies
(link is external)
In
Chaillot Paper
. Paris: European Union, Institute for Security Studies, 2018.
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
95
96
97
98
99
100
101
102
103
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top