Biblio

Export 21402 results:
2019
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
Lande, Dmytro, Igor Subach, and Artyom Sobolyev. Computer program of social networks content monitoring on cybersecurity - "CyberAggregator" In Certificate of registration of copyright to the work from 31.07.2019. Ukraine, 2019.
The Constitution Protection Bureau (SAB)., 2019.
Saranov, Nikola. "Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
Larsen, Marie Hjelseth, and Susann Øvretveit. Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
Si, Katherine. Cosco Shipping Port sells port assets to SIPG. Seatrade Maritime, 2019.
CoSoSys Endpoint Protector Web Page., 2019.
Ponemon Institute & Accenture Security. The Cost of Cybercrime, 2019., 2019.
Counterintelligence. Latvian State Security Service, 2019.
Counterterrorism. Latvian State Security Service, 2019.
Ogar, Sarah. Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Jeżewski, Rosław. "Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study." Connections: The Quarterly Journal 18, no. 1-2 (2019).
Turčaník, Michal, and Martin Javurek. "Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
Kozina, Andrija. "The Culture of Military School: The Example of the Dr. Franjo Tudjman Croatian Defense Academy." Connections: The Quarterly Journal 18, no. 3 (2019): 45-63.
Rahouti, Mohamed, and Kaiqi Xiong. A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019 In Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)., 2019.
NCSC. Cyber Assessment Framework V3.0., 2019.
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019 In Security Report. Check Point Research, 2019.
Tikk, Eneken, Kristine Hovhannisyan, Mika Kerttunen, and Mirva Salminen. Cyber Conflict Fact Book: Effect-Creating State-on-State Cyber Operations. Jyväskylä: Cyber Policy Institute, 2019.
J.P., Kalkman, and Wieskamp L.. "Cyber Intelligence Networks: A Typology." International Journal of Intelligence, Security, and Public Affairs 21, no. 1 (2019): 4-24.
Baskar, Kala, and Mahesh Balakris. "Cyber Preparedness in Maritime Industry." nternational Journal of Scientific and Technical Advancements 5, no. 2 (2019): 19-28.
Kott, Alexander, and Igor Linkov. Cyber Resilience of Systems and Networks. Risk, System and Decisions. Cham: Springer, 2019.
Sharkov, George. "Cyber Resilience of Systems-of-Intelligent-Systems." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Clim, Antonio. "Cyber Security Beyond the Industry 4.0 Era. A Short Review on a Few Technological Promises." Informatica Economică 23, no. 2 (2019).
Yeboah-Ofori, Abel, and Shareeful Islam. "Cyber Security Threat Modeling for Supply Chain Organizational Environments." Future Internet 11, no. 3 (2019): 63.
Pöyhönen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajamäki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256.

Pages