Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21402 results:
RTF
EndNote XML
2019
Zālīte, Indulis
.
Structure and Main Directions of Action of the State Security Committee of the Latvia Soviet Socialist Republic in 1980-1991
. LPRA, 2019.
Google Scholar
RTF
EndNote XML
Štruktúra ŠtB [StB Structure]
., 2019.
Google Scholar
RTF
EndNote XML
Sestrimski, Borislav
.
"
Study on the Level of Cybersecurity and the Mechanisms for Citizens' Contribution to Preventive Policies
." In
DIGILIENCE 2019
. Sofia, Bulgaria, 2019.
Google Scholar
RTF
EndNote XML
Breitenbauch, Henrik
, and
Niels Byrjalsen
.
"
Subversion, Statecraft and Liberal Democracy
."
Survival Global Politics and Strategy
61, no. 4 (2019).
Google Scholar
RTF
EndNote XML
Vilander, Jaakko
,
Antti-Tuomas Pulkka
,
Ville Erkkilä
,
Erkki Saarikoski
, and
Teija Norri-Sederholm
.
"
Suomalaisten käsityksiä sodan sekä kyber- ja informaatiosodankäynnin uhkasta
."
Tiede Ja Ase
1 (2019).
Google Scholar
RTF
EndNote XML
Supervision and control
. The Constitution Protection Bureau, 2019.
Google Scholar
RTF
EndNote XML
Hardwick, Jialin
, and
Alistair R. Anderson
.
"
Supplier-customer engagement for collaborative innovation using video conferencing: A study of SMEs
."
Industrial Marketing Management
80 (2019): 43-57.
Google Scholar
RTF
EndNote XML
Pandey, Shipra
,
Rajesh K. Singh
, and
Angappa Gunasekaran
.
"
Supply chain risks in Industry 4.0 environment: review and analysis framework
." In
Production Planning & Control: The Management of Operations
., 2019.
Google Scholar
RTF
EndNote XML
Beuran, Razvan
,
Dat Tang
,
Zheyu Tan
,
Shinobu Hasegawa
,
Yasuo Tan
, and
Yoichi Shinoda
.
"
Supporting cybersecurity education and training via LMS integration: CyLMS
."
Education and Information Technologies
24 (2019): 3619-3643.
Google Scholar
RTF
EndNote XML
Khraisat, Ansam
,
Iqbal Gondal
,
Peter Vamplew
, and
Joarder Kamruzzaman
.
"
Survey of intrusion detection systems: techniques, datasets and challenges
."
Cybersecurity
2 (2019).
DOI
Google Scholar
RTF
EndNote XML
SysSec Red Book Web Page
., 2019.
Google Scholar
RTF
EndNote XML
Zaslavskyi, Volodymyr
, and
Maya Pasichna
.
"
System Approach Towards the Creation of Secure and Resilient Information Technologies in the Energy Sector
."
Information & Security: An International Journal
43, no. 3 (2019): 318-330.
DOI
Google Scholar
RTF
EndNote XML
Shchoholiev, Maksym
, and
Violeta Tretynyk
.
"
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
."
Information & Security: An International Journal
43, no. 3 (2019): 375-382.
DOI
Google Scholar
RTF
EndNote XML
Bertolino, Antonia
,
Guglielmo De Angelis
,
Micael Gallego
,
Boni García
,
Francisco Gortázar
,
Francesca Lonetti
, and
Eda Marchetti
.
"
A Systematic Review on Cloud Testing
."
Systematic Review on Cloud Testing
52, no. 5A (2019).
Google Scholar
RTF
EndNote XML
Molodetska, Kateryna
, and
Yuriy Tymonin
.
"
System-dynamic models of destructive informational influence in social networking services
."
International Journal of 3D Printing
3, no. 2 (2019): 137-146.
Google Scholar
RTF
EndNote XML
T/8029th Bill proposal
. Prime Minister’s Office, 2019.
Google Scholar
RTF
EndNote XML
Pernin, Christopher G.
,
Jakub P. Hlavka
,
Matthew E. Boyer
,
John Gordon, IV
,
Michael Lerario
,
Jan Osburg
,
Michael Shurkin
, and
Daniel C. Gibson
.
Targeted interoperability: A new imperative for multinational operations
. RAND Corporation, 2019.
Google Scholar
RTF
EndNote XML
Tumkevič, Agnija
.
Tarptautinio bendradarbiavimo ir konflikto potencialas kibernetinėje erdvėje
. Vol. Daktaro disertacija. Vilniaus Universitetas, 2019.
Google Scholar
RTF
EndNote XML
Mestric, Ivana Ilic
,
Arvid Kok
,
Giavid Valiyev
, and
Michael Street
.
Technical Report: Exploration of NATO Exercise Big Data for Lessons Learned
. The Hague: NCI Agency, 2019.
Google Scholar
RTF
EndNote XML
Srivastava, Rachit
.
"
Terrorism in Central Asia
."
Research journal of social sciences
10, no. 7 (2019): 179-185.
Google Scholar
RTF
EndNote XML
Rózsa, Tibor
.
"
Theory, Practice and Tendencies of Information Operations
."
Defence Review
5 (2019): 82-84.
Google Scholar
RTF
EndNote XML
Repussard, Eva-Nour
.
There Is No Attribution Problem, Only a Diplomatic One
. King’s College University, 2019.
Google Scholar
RTF
EndNote XML
Andreev, Metodi
.
There was nothing in the reports of the special services about Russian espionage and Gebrev’s poisoning
. FrogNews, 2019.
Google Scholar
RTF
EndNote XML
Iliev, Ilia
.
They are pointing to Russia, aiming at Europe
. Trud, 2019.
Google Scholar
RTF
EndNote XML
Dalto, Jeffrey
.
The Three Phases of Risk Assessment: Risk Management Basics
In
Vector solutions, Convergence training
., 2019.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
79
80
81
82
83
84
85
86
87
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance