Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2019
Aron, Raymond
,
Kishore Mahbubani
,
Fawaz Gerges
,
Alioune Sall
,
Nicole Gnesotto
, and
Jared Cohen
.
The world in 10 years
. Institut Français des Relations Internationales (IFRI) , 2019.
Google Scholar
RTF
EndNote XML
XII. Správa ZNB [12th Directorate of the National Security Corps]
., 2019.
Google Scholar
RTF
EndNote XML
XII. Správa ZNB, popis odborov [12th Directorate of the National Security Corps, description of departments]
., 2019.
Google Scholar
RTF
EndNote XML
Deutscher Bundestag
.
Zum Verhältnis der Militärausgaben der NATO-Mitgliedstaaten
. Wissenschaftlicher Dienst, 2019.
Google Scholar
RTF
EndNote XML
Тарнавська, Ірина
.
Інформаційно-Аналітичне Забезпечення Євроінтеграційних Процесів в Україні
. Vol. Дисертація. Дніпро: Дніпровський національний університет імені Олеся Гончара, Міністерство освіти і науки України, 2019.
Google Scholar
RTF
EndNote XML
Доронін, Іван
.
"
Контрольні Повноваження Президента України у Сфері Національної Безпеки: Проблеми і Перспективи
."
Адміністративне право і процес
2 (2019).
Google Scholar
RTF
EndNote XML
Николић, Дејан Ж.
,
Митар Ковач
, and
Влада М. Митић
.
"
Менаџмент у одбрани – основне функције [Defence Management – Main Functions]
."
Воjно дело
71, no. 1 (2019): 99-126.
Google Scholar
RTF
EndNote XML
.
Основи на киберсигурността
. София: Авангард, 2019.
Google Scholar
RTF
EndNote XML
2018
10 IT management certifications for IT leaders
. CIO, Communications, IDG, 2018.
Google Scholar
RTF
EndNote XML
2018 Aspen Cyber Summit
., 2018.
Google Scholar
RTF
EndNote XML
2018 Best Practice Guidelines for the EU Code of Conduct on Data Centre Energy Efficiency
In
JRC Technical Reports
. European Commission, 2018.
Google Scholar
RTF
EndNote XML
2018 Payment Security Report
. Verizon, 2018.
Google Scholar
RTF
EndNote XML
Jiang, Luo
,
Juyong Zhang
,
Bailin Deng
,
Hao Li
, and
Ligang Liu
.
"
3D Face Reconstruction with Geometry Details from a Single Image
."
IEEE Transactions on Image Processing
27, no. 10 (2018): 4756-4770.
DOI
Google Scholar
RTF
EndNote XML
Seif, George
.
The 5 Clustering Algorithms Data Scientists Need to Know
., 2018.
Google Scholar
RTF
EndNote XML
Abschlussbericht des Sonderbeauftragten des Senats für die Aufklärung des Handelns der Berliner Behörden im Fall AMRI
. Berlin.de , 2018.
Google Scholar
RTF
EndNote XML
J., Singh
,
Reed C.
,
Cobbe J.
,
Crowcroft J.
, and
Millard C.
.
"
Accountability in the IOT: Systems, Law, and Ways Forward
."
Computer
51, no. 7 (2018): 54-65.
DOI
Google Scholar
RTF
EndNote XML
United States Cyber Command
.
Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command
., 2018.
Google Scholar
RTF
EndNote XML
Commission, European
.
Action Plan against Disinformation
In
High Representative of the Union for Foreign Affairs and Security Policy
. Brussels, 2018.
Google Scholar
RTF
EndNote XML
Dong, Ying
,
Yuqing Zhang
,
Hua Ma
,
Qianru Wu
,
Qixu Liu
,
Kai Wang
, and
Wenjie Wang
.
"
An adaptive system for detecting malicious queries in web attacks
."
Science China Information Sciences
61 (2018).
DOI
Google Scholar
RTF
EndNote XML
Akgül, Yakup
.
"
Adoption of E-Government Services in Turkey
."
AJIT-e: Online Academic Journal of Information Technology
9, no. 32 (2018).
Google Scholar
RTF
EndNote XML
Brown, T.B.
,
D. Mané
,
A. Roy
,
M. Abadi
, and
J. Gilmer
.
"
Adversarial Patch
."
arXiv e-prints
(2018).
Google Scholar
RTF
EndNote XML
Roloff, Ralf
, and
Pàl Dunay
.
"
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank
."
Connections: The Quarterly Journal
17, no. 2 (2018): 19-35.
DOI
Google Scholar
RTF
EndNote XML
Mylrea, Michael
.
AI Enabled Blockchain Smart Contracts: Cyber Resilient Energy Infrastructure and IoT
In
2018 AAAI Spring Symposium Series
., 2018.
Google Scholar
RTF
EndNote XML
Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices
. US Department of Homeland Security, 2018.
Google Scholar
RTF
EndNote XML
Alliance C3 Strategy
. NATO, 2018.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
83
84
85
86
87
88
89
90
91
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance