Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2020
Mechev, Stoyan
,
Elisaveta Staneva
, and
Mariyan Rachev
.
"
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
."
Information & Security: An International Journal
47, no. 3 (2020): 300-305.
DOI
Google Scholar
RTF
EndNote XML
Atanasov, Stanislav
.
Cybersecurity Risks and Challenges in the Covid-19 Pandemic
In
CSDM Views
., 2020.
DOI
Google Scholar
RTF
EndNote XML
Cybersecurity Risks Increasing During COVID-19 Pandemic
. Shell&Wilmer, 2020.
Google Scholar
RTF
EndNote XML
Boehm, Jim
,
James Kaplan
, and
Nathan Sportsman
.
Cybersecurity’s dual mission during the coronavirus crisis
., 2020.
Google Scholar
RTF
EndNote XML
Boehm, Jim
,
James Kaplan
,
Marc Sorel
,
Nathan Sportsman
, and
Trevor Steen
.
Cybersecurity tactics for coronavirus pandemic
. McKinsey&Company, 2020.
Google Scholar
RTF
EndNote XML
Sharkov, George
,
Yavor Papazov
,
Christina Todorovaa
,
Georgi Koykov
, and
Georgi Zahariev
.
"
Cybersecurity Tools for Threat Intelligence and Vulnerability Monitoring for National and Sectoral Analysis
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2020.
Google Scholar
RTF
EndNote XML
Gourisetti, Sri Nikhil Gup
,
Michael Mylrea
, and
Hirak Patangia
.
"
Cybersecurity Vulnerability Mitigation Framework through Empirical Paradigm: Enhanced Prioritized Gap Analysis
."
Future Generation Computer Systems
105 (2020): 410-431.
DOI
Google Scholar
RTF
EndNote XML
CyRADARS Cyber Rapid Analysis for Defense Awareness of Real-Time Situation
., 2020.
Google Scholar
RTF
EndNote XML
The CyRADARS web site
., 2020.
Google Scholar
RTF
EndNote XML
Gogan, Janis
,
Kieran Conboy
, and
Joseph Weiss
.
Dangerous champions of IT innovation
In
53rd Hawaii International Conference on System Sciences
. Maui, Hawaii, 2020.
Google Scholar
RTF
EndNote XML
Lenk, Peter
,
Michael Street
,
Ivana Ilic Mestric
,
Arvid Kok
,
Giavid Valiyev
,
Philippe Le Cerf
, and
Barbara Lorincz
.
"
Data Science as a Service: The Data Range
."
Information & Security: An International Journal
47, no. 2 (2020): 157-171.
DOI
Google Scholar
RTF
EndNote XML
Borissova, Daniela
,
Magdalena Garvanova
,
Zornitsa Dimitrova
,
Andrea Pandulis
, and
Ivan Garvanov
.
"
Decision Support Framework for Composing of Different Questionnaires Based on Business Model with Optimization
." In
Integrated Uncertainty in Knowledge Modelling and Decision Making
. Springer Nature, 2020.
Google Scholar
RTF
EndNote XML
Whyte, Christopher
.
"
Deepfake news: AI-enabled disinformation as a multi-level public policy challenge
."
Journal Journal of Cyber Policy
(2020).
Google Scholar
RTF
EndNote XML
Defence in Canada
. Thales, 2020.
Google Scholar
RTF
EndNote XML
Defence Ministry signs 50M leva contract with Bulgarian firm for 98 armoured vehicles
. The Sofia Globe, 2020.
Google Scholar
RTF
EndNote XML
Tsvetkov, Georgi
.
Defence Policy of Republic of Bulgaria: Critical Analysis
In
Security and Defence Management
. Vol. 7. Sofia: Procon, 2020.
DOI
Google Scholar
RTF
EndNote XML
Ćutić, Davor
.
Defence Resources Management and Capabilities Building
In
Interdisciplinary Management Research Conference
. Vol. XVI., 2020.
Google Scholar
RTF
EndNote XML
"
Deferral Sought on Signing Rail Contract
."
Bangkok Post
(2020).
Google Scholar
RTF
EndNote XML
Definitions of Community Resilience: An Analysis
In
A CARRI Report
., 2020.
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Demography, Capabilies and Security
In
IT4Sec Reports
., 2020.
DOI
Google Scholar
RTF
EndNote XML
Department of Homeland Security. Universal Task List: Version 2.1.
. Washington, D.C. , 2020.
Google Scholar
RTF
EndNote XML
Sorrento, Aureliana
.
"
Der Dritte Dämpfer
."
Internationale Politik 3
(2020).
Google Scholar
RTF
EndNote XML
Ninsiana, Widhiya
.
"
Deradicalizing Religious Extremism Linguistically: An Intertextual Approach to Islamic Extremists’ View on the Qur’anic Interpretation
."
Jurnal Pemikiran Islam
25, no. 02 (2020).
Google Scholar
RTF
EndNote XML
Skiter, Ihor
,
Ivan Burmaka
, and
Andriy Sigayov
.
"
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
."
Information & Security: An International Journal
47, no. 3 (2020): 306-316.
DOI
Google Scholar
RTF
EndNote XML
Jaursch, Julian
.
Desinformation zu COVID-19: Wie die Platformen durchgreifen und welche Fragen das aufwirft
. NetzPolitik.com, 2020.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance