Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2020
Nsaibia, Heni
, and
Caleb Weiss
.
"
The End of the Sahelian Anomaly: How the Global Conflict between the Islamic State and al-Qa`ida Finally Came to West Africa
."
CTC Sentinel
13, no. 7 (2020): 1-14.
Google Scholar
RTF
EndNote XML
Spadafora, Anthony
.
Energy Giant EDP Hit with RagnarLocker Ransomware
. UK edition. techradar.pro, 2020.
Google Scholar
RTF
EndNote XML
Reuschke, Darja
, and
Colin Mason
.
"
The engagement of home-based businesses in the digital economy
."
Futures
(2020).
DOI
Google Scholar
RTF
EndNote XML
Saleem, Nageen
,
Areeba Rahman
,
Muhammad Rizwan
,
Shahid Naseem
, and
Fahad Ahmad
.
Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
In
EAI Endorsed Transactions on Scalable Information Systems
., 2020.
Google Scholar
RTF
EndNote XML
Pavlova, Elitsa
.
"
Enhancing the Organisational Culture related to Cyber Security during the University Digital Transformation
."
Information & Security: An International Journal
46, no. 3 (2020): 239-249.
DOI
Google Scholar
RTF
EndNote XML
Siddiqui, Usaid
.
"
Epidemics, War Have Impacted Muslim Worship Throughout History
."
Al Jazeera
(2020).
Google Scholar
RTF
EndNote XML
Matern, Silvia
.
"
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations
."
Information & Security: An International Journal
46, no. 1 (2020): 114-124.
DOI
Google Scholar
RTF
EndNote XML
Fruhlinger, Josh
.
Equifax Data Breach FAQ: What Happened, Who Was Affected, What Was the Impact?
. CSO, 2020.
Google Scholar
RTF
EndNote XML
ESDC - European Security and Defense College
., 2020.
Google Scholar
RTF
EndNote XML
ESP8266 Introduction
., 2020.
Google Scholar
RTF
EndNote XML
esp8266_deauther
., 2020.
Google Scholar
RTF
EndNote XML
Establishing and operating a pilot for a Cybersecurity Competence Network to develop and implement a common Cybersecurity Research & Innovation Roadmap
. ID: SU-ICT-03-2018, 2020.
Google Scholar
RTF
EndNote XML
ETSI TR 102 031-1 V1.1.1 (2002-01): Fixed Radio Systems. Point-to-point and point-to-multipoint equipment. Use of circular polarization in multipoint systems. Part 1: Systems aspects
In
Technical Report
. ETSI, 2020.
Google Scholar
RTF
EndNote XML
EU ERCC
., 2020.
Google Scholar
RTF
EndNote XML
EU versus Disinformation
. EU Commission, 2020.
Google Scholar
RTF
EndNote XML
EU-NATO Cooperation – Factsheets
. EEAS, 2020.
Google Scholar
RTF
EndNote XML
A European Competence Network of Cybersecurity Centres of Excellence: About
., 2020.
Google Scholar
RTF
EndNote XML
European network of Cybersecurity centres and competence Hub for innovation and Operations (ECHO)
., 2020.
Google Scholar
RTF
EndNote XML
EUvsDisinfo
., 2020.
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Evaluating the Utility of Distance Learning Forms during the Covid-19 Pandemic
In
IT4Sec Reports
., 2020.
DOI
Google Scholar
RTF
EndNote XML
Rogers, Peter
.
"
The Evolution of Resilience
."
Connections: The Quarterly Journal
19, no. 3 (2020): 13-32.
DOI
Google Scholar
RTF
EndNote XML
Hurak, Ihor
, and
Paul D’Anieri
.
"
The Evolution of Russian Political Tactics in Ukraine
."
Problems of Post-Communism
(2020).
DOI
Google Scholar
RTF
EndNote XML
Ishiwatari, Mikio
.
"
Evolving Concept of Resilience: Soft Measures of Flood Risk Management in Japan
."
Connections: The Quarterly Journal
19, no. 3 (2020): 99-107.
DOI
Google Scholar
RTF
EndNote XML
Ounda, Daniel
.
Examining the Role of Security Operations Centres (SOCs) in the Age of Cybercrime
. Kenya Engineer, 2020.
Google Scholar
RTF
EndNote XML
Chief Information Officer
.
Executive Guide
., 2020.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance