Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2018
Commission Nationale de l'Informatique et des Libertés
.
May 2018 updates for the PIA tool
., 2018.
Google Scholar
RTF
EndNote XML
Vos, Marita
,
Petri Kekäle
,
A. Ruggiero
, and
Pauliina Palttala
.
"
Measuring Crisis Communication Preparedness Across Different Branches of Government – Sharing Experiences Gained in Finland
."
Online Journal of Communication and Media Technologies
8, no. 1 (2018): 60-69.
Google Scholar
RTF
EndNote XML
Rapoza, Kenneth
.
"
Meet The Russians Behind Your Blockchain (And Cryptocurrency, Too)
."
Forbes
(2018).
Google Scholar
RTF
EndNote XML
Stoltenberg, Jens
.
Meeting the Press
. NATO Newsroom, 2018.
Google Scholar
RTF
EndNote XML
Kramer, Franklin
, and
Hans Binnendijk
.
Meeting the Russian Conventional Challenge
. Atlantic Council/Scowcroft Center for Strategy and Security,, 2018.
Google Scholar
RTF
EndNote XML
Labreuche, Christophe Camille
,
Helia Pouyllau
,
Pierre Saveant
,
Yann Semet
,
Jan-Egbert Hamming
, and
Maurice Houtsma
.
Method for determining tactical actions
. Thales SA, 2018.
Google Scholar
RTF
EndNote XML
Hryshchuk, Ruslan
, and
Katerina Molodetska-Hrynhchuk
.
"
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
."
Information & Security: An International Journal
41 (2018): 61-79.
DOI
Google Scholar
RTF
EndNote XML
Nepomnyashchyy, Oleksandr
, and
Iryna Lahunova
.
"
Methodology of Risk Management in Providing Sustainable Development of Settlements
."
Information & Security: An International Journal
40, no. 1 (2018): 100-104.
DOI
Google Scholar
RTF
EndNote XML
Skiter, I. S.
.
Methods of forming an image of a normal computer behavior Networks
In
III International Conference "Problems of Decommissioning of Objects nuclear energy and the restoration of the environment," INUDECO
. Slavutych, 2018.
Google Scholar
RTF
EndNote XML
Luyt, Catherine Diane
,
Roman Tandlich
,
Wilhelmine Jakobina Muller
, and
Brendan Shane Wilhelmi
.
"
Microbial monitoring of surface water in South Africa
."
International Journal of Environmental Research and Public Health 9, no 8 (2012): 2669-2693
(2018).
Google Scholar
RTF
EndNote XML
Military Construction Program, FY 2019 Budget
. Department of Defense, 2018.
Google Scholar
RTF
EndNote XML
Shalamanov, Velizar
.
MN Formations Centric Defense Partnership – the Way Ahead in CEE / SEE
., 2018.
Google Scholar
RTF
EndNote XML
Gaydarski, I.
,
Zlatogor Minchev
, and
R. Andreev
.
"
Model Driven Architectural Design of Information Security System
." In
14th International Conference on Information Assurance and Security (IAS 2018)
. Porto, Portugal, 2018.
Google Scholar
RTF
EndNote XML
Tselkov, Veselin
, and
Nikolai Stoianov
.
A Model of Software Cryptography System for Data Protection in Distribution Information Systems
., 2018.
Google Scholar
RTF
EndNote XML
Chen, Ya-Zhou
, and
Peng Zhang
.
"
Modeling and Simulation Oriented to the Multi-Military Mission of U.S. Army (美军面向多样化军事任务的建模仿真研究)
."
Journal of Command And Control
4, no. 2 (2018).
Google Scholar
RTF
EndNote XML
Wither, James
.
"
Modern guerillas and the defense of the Baltic States
."
Small Wars Journal
(2018): 7.
Google Scholar
RTF
EndNote XML
Wither, James K.
.
"
’Modern Guerrillas’ and the Defense of the Baltic States
."
Small Wars Journal
(2018).
Google Scholar
RTF
EndNote XML
Perwita, Anak Agung Bany
, and
Widya Dwi Rachmawati
.
"
The Modernization of Poland Defense Forces to Respond Russia Military Presence in Kaliningrad Oblast (2014-2017)
."
Jurnal Global & Strategis
12, no. 1 (2018).
Google Scholar
RTF
EndNote XML
Stoyanova, Krassimira
, and
Vassil Guliashki
.
MOEAs for portfolio optimization applications
. Lambert Academic Publishing, 2018.
Google Scholar
RTF
EndNote XML
A Mole Among Trolls: Inside the Internet Research Agency
. VoA news, 2018.
Google Scholar
RTF
EndNote XML
Gerig, Thomas
,
Andreas Morel-Forster
,
Clemens Blumer
,
Bernard Egger
,
Marcel Luthi
,
Sandro Schoenborn
, and
Thomas Vetter
.
Morphable Face Models - An Open Framework
In
13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), 2018
., 2018.
DOI
Google Scholar
RTF
EndNote XML
McSweeney, Kelly
.
Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study
. Capella University, 2018.
Google Scholar
RTF
EndNote XML
Harmouch, Youssef
,
Rachid Elkouch
, and
Hussain Ben-azza
.
"
Multiple New Formulas for Cipher Performance Computing
."
International Journal of Network Security
20, no. 4 (2018): 788-800.
Google Scholar
RTF
EndNote XML
Schindler, John R.
.
"
Mysterious Balkan Assassination Threatens Regional Peace
."
Observer
(2018).
Google Scholar
RTF
EndNote XML
Nagorno-Karabakh Reports 250 Azerbaijani Ceasefire Violations
. Tert , 2018.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
101
102
103
104
105
106
107
108
109
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance