Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2020
Lande, Dmytro
,
Igor Subach
, and
Alexander Puchkov
.
"
A System for Analysis of Big Data from Social Media
."
Information & Security: An International Journal
47, no. 1 (2020): 44-61.
DOI
Google Scholar
RTF
EndNote XML
Estay, Daniel A. Sepúlv
,
Rishikesh Sahay
,
Michael B. Barfod
, and
Christian D. Jensen
.
"
A Systematic Review of Cyber-resilience Assessment Frameworks
."
Computers & Security
97 (2020): 101996.
DOI
Google Scholar
RTF
EndNote XML
Staneva, Elisaveta
, and
Mariyan Rachev
.
"
Tactical Approach to Cyber Defence in IoT Computer Networks
."
Information & Security: An International Journal
47, no. 1 (2020): 135-140.
DOI
Google Scholar
RTF
EndNote XML
Najibullah, Farangis
.
Tajik Workers Face Dire Future as Russia Closes Borders Over Coronavirus
. Radio Free Europe/ Radio Liberty, 2020.
Google Scholar
RTF
EndNote XML
McKay, B.
, and
K. McKay
.
"
The Tao of Boyd: How to Master the OODA Loop.
." In
The Art of Manliness
., 2020.
Google Scholar
RTF
EndNote XML
Bolton, Derek
.
"
Targeting Ontological Security: Information Warfare in the Modern Age
."
Political Psychology
(2020).
DOI
Google Scholar
RTF
EndNote XML
Ronchi, Alfredo M.
.
"
TAS: Trust Assessment System
."
Information & Security: An International Journal
44 (2020): 62-75.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Valeri Ratchev
.
"
A Taxonomy of Crisis Management Functions
."
Sustainability
12, no. 12 (2020).
DOI
Google Scholar
RTF
EndNote XML
Fernández-Caramés, Tiago M.
, and
Paula Fraga-Lamas
.
"
Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
."
Sensors
20, no. 11 (2020): 3048.
DOI
Google Scholar
RTF
EndNote XML
Ahmed, Ali
,
Karsten Lundqvist
,
Craig Watterson
, and
Nilufar Baghaei
.
"
Teaching Cyber-Security for Distance Learners: A Reflective Study
." In
2020 IEEE Frontiers in Education Conference (FIE)
. Uppsala, Sweden, 2020.
DOI
Google Scholar
RTF
EndNote XML
Nzioki, Veronica Waeni
.
"
Technology as a Resilience Factor in Peace Operations
."
Connections: The Quarterly Journal
19, no. 4 (2020): 69-85.
DOI
Google Scholar
RTF
EndNote XML
Ten Things You Can Learn from Women’s Resilience that Help You Stay Strong in the Time of Covid-19
. UN Women, 2020.
Google Scholar
RTF
EndNote XML
Olu-Adeyemi, Lanre
, and
Shaibu Makanjuaola
.
"
Is there a Borderline in Nigeria’s North-East: Multinational Joint Task Force and Counterinsurgency Operation in Perspective
."
African Journal of Political Science and International Relations
14, no. 2 (2020): 33-45.
Google Scholar
RTF
EndNote XML
Horowitz, Michael C.
, and
Joshua A. Schwartz
.
To Compete or Retreat? The Global Diffusion of Precision Strike
. SSRN, 2020.
Google Scholar
RTF
EndNote XML
Odarushchenko, Oleg
, and
Elena Odarushchenko
.
"
Tool-Based Assessment of Reactor Trip Systems Availability and Safety Using Markov Modeling
." In
Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems
., 2020.
Google Scholar
RTF
EndNote XML
Melnick, Jeff
.
Top 10 Most Common Types of Cyber Attacks
. Netwrix Blog, 2020.
Google Scholar
RTF
EndNote XML
Cearley, David
,
Nick Jones
,
Brian Burke
,
David Smith
,
Arun Chandrasekaran
,
CK Lu
, and
Frances Karamouzis
.
Top 10 strategic technology trends for 2020: A Gartner trend insight report
In
Gartner ID
., 2020.
Google Scholar
RTF
EndNote XML
Top 7 Mobile Security Threats in 2020
., 2020.
Google Scholar
RTF
EndNote XML
Dóra, Molnár
.
Törékeny Nagyhatalmiság: A Kiberbiztonság. Az Európai Kibertér Brit, Német És Francia Szegmensei
. Budapest: Nemzeti Közszolgálati Egyetem , 2020.
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
,
Olga Morozova
,
Oleg Illiashenko
, and
Sergii Sokolov
.
Toward Digital Twin Application in Manufacturing Using of Artificial Intelligence and Industrial IoT
In
IEEE 11th International Conference on Dependable Systems, Services and Technologies, DESSERT’2020
. Kyiv, Ukraine, 2020.
Google Scholar
RTF
EndNote XML
Wrona, Konrad
.
"
Towards Data-centric Security for NATO Operations
." In
DIGILIENCE 2020
., 2020.
Google Scholar
RTF
EndNote XML
Kaloyanova, Kalinka
.
"
Towards Requirements for Cybersecurity Curricula
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2020.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
"
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives
."
Future Internet
12, no. 4 (2020).
DOI
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
"
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives
."
Future Internet
12, no. 4 (2020): 62.
DOI
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Brid Davis
.
"
Towards the Design of a Cybersecurity Competence Network: Findings from the Analysis of Existing Networks
." In
10th International Conference on Multimedia Communications, Services & Security (MCSS 2020)
. Krakow, Poland, 2020.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
56
57
58
59
60
61
62
63
64
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance