Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2019
Ogar, Sarah
.
Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media
. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Google Scholar
RTF
EndNote XML
Jeżewski, Rosław
.
"
Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study
."
Connections: The Quarterly Journal
18, no. 1-2 (2019).
Google Scholar
RTF
EndNote XML
Turčaník, Michal
, and
Martin Javurek
.
"
Cryptographic Key Generation by Genetic Algorithms
."
Information & Security: An International Journal
43, no. 1 (2019): 54-61.
DOI
Google Scholar
RTF
EndNote XML
Kozina, Andrija
.
"
The Culture of Military School: The Example of the Dr. Franjo Tudjman Croatian Defense Academy
."
Connections: The Quarterly Journal
18, no. 3 (2019): 45-63.
DOI
Google Scholar
RTF
EndNote XML
Rahouti, Mohamed
, and
Kaiqi Xiong
.
A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019
In
Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)
., 2019.
DOI
Google Scholar
RTF
EndNote XML
NCSC
.
Cyber Assessment Framework V3.0
., 2019.
Google Scholar
RTF
EndNote XML
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019
In
Security Report
. Check Point Research, 2019.
Google Scholar
RTF
EndNote XML
Tikk, Eneken
,
Kristine Hovhannisyan
,
Mika Kerttunen
, and
Mirva Salminen
.
Cyber Conflict Fact Book: Effect-Creating State-on-State Cyber Operations
. Jyväskylä: Cyber Policy Institute, 2019.
Google Scholar
RTF
EndNote XML
J.P., Kalkman
, and
Wieskamp L.
.
"
Cyber Intelligence Networks: A Typology
."
International Journal of Intelligence, Security, and Public Affairs
21, no. 1 (2019): 4-24.
DOI
Google Scholar
RTF
EndNote XML
Baskar, Kala
, and
Mahesh Balakris
.
"
Cyber Preparedness in Maritime Industry
."
nternational Journal of Scientific and Technical Advancements
5, no. 2 (2019): 19-28.
Google Scholar
RTF
EndNote XML
Kott, Alexander
, and
Igor Linkov
.
Cyber Resilience of Systems and Networks. Risk, System and Decisions
. Cham: Springer, 2019.
Google Scholar
RTF
EndNote XML
Sharkov, George
.
"
Cyber Resilience of Systems-of-Intelligent-Systems
." In
DIGILIENCE 2019
. Sofia, Bulgaria, 2019.
Google Scholar
RTF
EndNote XML
Clim, Antonio
.
"
Cyber Security Beyond the Industry 4.0 Era. A Short Review on a Few Technological Promises
."
Informatica Economică
23, no. 2 (2019).
Google Scholar
RTF
EndNote XML
Yeboah-Ofori, Abel
, and
Shareeful Islam
.
"
Cyber Security Threat Modeling for Supply Chain Organizational Environments
."
Future Internet
11, no. 3 (2019): 63.
DOI
Google Scholar
RTF
EndNote XML
Pöyhönen, Jouni
,
Viivi Nuojua
,
Martti Lehto
, and
Jyri Rajamäki
.
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
."
Information & Security: An International Journal
43, no. 2 (2019): 236-256.
DOI
Google Scholar
RTF
EndNote XML
Sharkov, George
,
Yavor Papazov
,
Christina Todorova
,
Georgi Koykov
,
Martin Georgiev
, and
Georgi Zahariev
.
Cyber Threat Map for National and Sectoral Analysis
In
Computer and Communications Engineering, Workshop on Information Security 2019, 9th Balkan Conference in Informatics
., 2019.
Google Scholar
RTF
EndNote XML
Shaikh, Siraj Ahmed
.
"
Cyber-Physical Systems Security: Research Challenges and Opportunities
.", 2019.
Google Scholar
RTF
EndNote XML
Siregar, Sessika
, and
Kuo-Chung Chang
.
"
Cybersecurity Agility: Antecedents and Effects on Security Incident Management Effectiveness
." In
23rd Pacific Asia Conference on Information Systems (PACIS 2019)
. China, 2019.
Google Scholar
RTF
EndNote XML
Cybersecurity Capability Maturity Model (C2M2), Version 2.0
., 2019.
Google Scholar
RTF
EndNote XML
Oloidi, Aramide
.
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
. Vol. PhD dissertation. San Diego, CA: Northcentral University, 2019.
Google Scholar
RTF
EndNote XML
Morris, Gerald F.
.
The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada
. Northcentral University, 2019.
Google Scholar
RTF
EndNote XML
Cybersecurity Considerations for Institutions of Higher Education
., 2019.
Google Scholar
RTF
EndNote XML
Gonzalez, III, Joaquin Jay
, and
Roger L. Kemp
.
Cybersecurity: Current Writings on Threats and Protection
. Jefferson, NC: McFarland, 2019.
Google Scholar
RTF
EndNote XML
Asghar, Muhammad Rizwan
,
Qinwen Hu
, and
Sherali Zeadally
.
"
Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges
."
Computer Networks
165 (2019): 106946.
DOI
Google Scholar
RTF
EndNote XML
Cybersecurity in the shipping industry
In
Capital Link Cyprus Shipping Forum, Deloitte
., 2019.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
64
65
66
67
68
69
70
71
72
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance