Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2020
Shalamanov, Velizar
,
Nikolai Stoianov
, and
Yantsislav Yanakiev
.
"
ICT Governance, Human Factors and Cyber Situational Awareness
."
Information & Security: An International Journal
46, no. 1 (2020): 7-10.
DOI
Google Scholar
RTF
EndNote XML
Coleman, Julie
.
The Impact of Coronavirus on Terrorism in the Sahel
., 2020.
Google Scholar
RTF
EndNote XML
Norlen, Tova C.
.
"
The Impact of COVID-19 on Salafi-Jihadi Terrorism
."
Connections: The Quarterly Journal
19, no. 2 (2020): 11-23.
DOI
Google Scholar
RTF
EndNote XML
Banholzera, Nicolas
.
Impact of Non-pharmaceutical Interventions on Documented Cases of COVID-19: A Cross-country Analysis
. medRxiv, 2020.
DOI
Google Scholar
RTF
EndNote XML
Kaya, Hamit Berat
.
"
Impact of Strong Leader Profile on National Energy Policies: Putin-Era Russian Energy Strategy
." In
Chaos, Complexity and Leadership 2020: Application of Nonlinear Dynamics from Interdisciplinary Perspective
. Cham: Springer, 2020.
DOI
Google Scholar
RTF
EndNote XML
Chazizza, Mordechai
.
The Impact of the Coronavirus Pandemic on China’s Belt and Road Initiative in the Middle East
. Middle East Institute, 2020.
Google Scholar
RTF
EndNote XML
Alloghani, Mohamed
,
Dhiya Al-Jumeily
,
Abir Hussain
,
Jamila Mustafina
,
Thar Baker
, and
Ahmed J. Aljaaf
.
"
Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks
." In
Nature-Inspired Computation in Data Mining and Machine Learning. Studies in Computational Intelligence
., 2020.
Google Scholar
RTF
EndNote XML
Alloghani, Mohamed
,
Dhiya Al-Jumeily
,
Abir Hussain
,
Jamila Mustafina
,
Thar Baker
, and
Ahmed J. Aljaaf
.
"
Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities
." In
Nature-Inspired Computation in Data Mining and Machine Learning
. Springer Natur, 2020.
Google Scholar
RTF
EndNote XML
Wallis, Tania
, and
Chris Johnson
.
"
Implementing the NIS Directive, Driving Cybersecurity Improvements for Essential Services
." In
2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
. Dublin, 2020.
DOI
Google Scholar
RTF
EndNote XML
Mouritz, Frank
.
"
Implications of the COVID-19 Pandemic on China’s Belt and Road Initiative
."
Connections: The Quarterly Journal
19, no. 2 (2020): 115-124.
DOI
Google Scholar
RTF
EndNote XML
Moreyra, María Julia
.
"
The Importance of Resilience in the Agenda Women, Peace and Security, Particularly During the COVID-19 Pandemic
."
Connections: The Quarterly Journal
19, no. 4 (2020): 87-96.
DOI
Google Scholar
RTF
EndNote XML
United Nations Office for Disarmament Affairs
.
Improvised Explosive Devices (IEDs) Publication
., 2020.
Google Scholar
RTF
EndNote XML
Jalloh, Abu-Bakarr
.
Increased terror attacks in Africa amid coronavirus pandemic
., 2020.
Google Scholar
RTF
EndNote XML
Index of Indices
. ITU, 2020.
Google Scholar
RTF
EndNote XML
de Kok, Lisa C.
,
Deborah Oosting
, and
Marcel Spruit
.
"
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour
."
Information & Security: An International Journal
46, no. 3 (2020): 251-266.
DOI
Google Scholar
RTF
EndNote XML
Makhathini, Thulile Nokwethemb
.
The Influence of Leadership, Organisational Climate, and the Mediating Role of Trust on South African Soldiers’ Willingness to Deploy: An Exploratory Study
In
Master Of Commerce (Industrial Psychology)
. Stellenbosch University, 2020.
Google Scholar
RTF
EndNote XML
"
Infographic and report
."
Thabaat Media Agency
(2020).
Google Scholar
RTF
EndNote XML
"
Infographic in Islamic State Al Naba’
." (2020).
Google Scholar
RTF
EndNote XML
Kallio, Jarno
.
Informaatio- ja Mielipidevaikuttamisen Taito Tapaus Operation Infektion
In
Politiikan tutkimus Yhteiskuntatieteiden ja filosofian laitos
. Vol. Kandidaatintutkielma . Jyväskylän yliopisto, 2020.
Google Scholar
RTF
EndNote XML
Odiaga, Gloria Awuor
,
Silvance Abeka
, and
Samuel Liyala
.
"
An Information Security Awareness Framework For Secondary School Teachers In Kenya
."
International Journal of Innovative Research and Advanced Studies (IJIRAS)
7, no. 5 (2020).
Google Scholar
RTF
EndNote XML
Rajamäki, Jyri
, and
Vasilis Katos
.
"
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence
."
Information & Security: An International Journal
46, no. 2 (2020): 198-214.
DOI
Google Scholar
RTF
EndNote XML
Petrivskyi, Volodymyr
,
Georgi Dimitrov
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Magdalena Garvanova
,
Galina Panayotova
, and
Pavel Petrov
.
"
Information Technology for Big Data Sensor Networks Stability Estimation
."
Information & Security: An International Journal
47, no. 1 (2020): 141-154.
DOI
Google Scholar
RTF
EndNote XML
Petrivskyi, Volodymyr
,
Victor Shevchenko
,
Oleksiy Bychkov
, and
Maksym Brazhenenko
.
Information technology of the increasing sensors term of use considering their movement
In
2020 IEEE XVIth International Conference on the Perspective Technologies and Meth-ods in MEMS Design (MEMSTECH)
. Lviv, Ukraine, 2020.
Google Scholar
RTF
EndNote XML
Mehrer, Angela
.
Information Warfare and the Politics of Threats: An analysis of Russian Information Warfare on Germany and its Perception by German politicians
In
Faculty of Social Sciences, Institute of Political Science
. Vol. Master thesis. Prague: Charles University , 2020.
Google Scholar
RTF
EndNote XML
Markovets, Oleksandr
,
Ruslana Pazderska
,
Oksana Horpyniuk
, and
Yuriy Syerov
.
"
Informational support of effective work of the community manager with web communities
." In
CEUR Workshop
., 2020.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
44
45
46
47
48
49
50
51
52
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance