Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2016
Ministry of Defence
.
Cyber Primer
. Second Edition. Shrivenham, UK: Development, Concepts and Doctrine Centre, 2016.
Google Scholar
RTF
EndNote XML
Cyber Resilient Bulgaria 2020
In
National Cybersecurity Strategy
., 2016.
Google Scholar
RTF
EndNote XML
Stevens, Tim
.
Cyber Security and the Politics of Time
. Cambridge University Press, 2016.
Google Scholar
RTF
EndNote XML
Topham, Luke
,
Kashif Kifayat
,
Younis A. Younis
,
Qi Shi
, and
Bob Askwith
.
"
Cyber Security Teaching and Learning Laboratories: A Survey
."
Information & Security: An International Journal
35, no. 1 (2016): 51-80.
DOI
Google Scholar
RTF
EndNote XML
Riley, Shawn
.
Cyber Terrain: A Model for Increased Understanding of Cyber Activity
. Centre for Strategi Cyberspace + Security Science, 2016.
Google Scholar
RTF
EndNote XML
Minchev, Zlatogor
.
Cyber Threats Identification in the Evolving Digital Reality
In
National Conference on "Education and Research in the Information Society"
. Plovdiv, 2016.
Google Scholar
RTF
EndNote XML
ICS – CERT
.
Cyber-Attack Against Ukrainian Critical Infrastructure
. Department of Homeland Security, 2016.
Google Scholar
RTF
EndNote XML
Mygal, Valeriy
, and
Galyna Mygal
.
"
Cyberphysical Approach to the Study of the Functioning of Dynamic Systems
."
Elektrotehnicheskie i kompyuternyie sistemyi
22, no. 9 (2016): 354-358.
Google Scholar
RTF
EndNote XML
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Google Scholar
RTF
EndNote XML
Illiashenko, Oleg A.
,
Yevheniia V. Broshevan
, and
Vyacheslav S. Kharchenko
.
"
Cybersecurity Case for FPGA-Based NPP Instrumentation and Control Systems
." In
24th International Conference on Nuclear Engineering ICONE24
. Charlotte, North Carolina, 2016.
Google Scholar
RTF
EndNote XML
Ristaino, Andre
.
Cybersecurity Critical for System Reliability
. InTech – International Society of Automation, 2016.
Google Scholar
RTF
EndNote XML
Miloslavskaya, Natalia G.
.
Cybersecurity Culture as an Element of IT Professional Training
. ResearchGate, 2016.
Google Scholar
RTF
EndNote XML
Minović, Adriana
,
Adel Abusara
,
,
Vladimir Erceg
,
Predrag Tasevski
,
Vladimir Radunović
, and
Franziska Klopfer
.
Cybersecurity in the Western Balkans: Policy gaps and cooperation opportunities
. Geneva: DiploFoundation, 2016.
Google Scholar
RTF
EndNote XML
Cybersecurity Information Sharing Act
In
CISA S.2588 - 113th Congress, S.754 - 114th Congress
., 2016.
Google Scholar
RTF
EndNote XML
Mohideen, Feroze
.
The Cyber-Security State of our Nation: A Critique of South Africas Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure
In
ICCWS 2016 11th International Conference on Cyber Warfare and Security
., 2016.
Google Scholar
RTF
EndNote XML
Dela, Piotr
.
"
Cyberspace as the Environment Affected by Organized Crime Activity
."
Connections: The Quarterly Journal
15, no. 3 (2016): 55-64.
DOI
Google Scholar
RTF
EndNote XML
Libicki, Martin C.
.
Cyberspace in Peace and War
. Naval Institute Press, 2016.
Google Scholar
RTF
EndNote XML
Sadiku, Matthew N. O.
,
Adebowale E. Shadare
,
Sarhan M. Musa
, and
Cajetan M. Akujuobi
.
"
Cyberterrorism
."
Journal of Multidisciplinary Engineering Science and Technology (JMEST)
3, no. 12 (2016).
Google Scholar
RTF
EndNote XML
McCain, John
.
Cyberwar – the only sphere, in which Russia is ahead of US
. interview by CNN, reported by RT, 2016.
Google Scholar
RTF
EndNote XML
Balcerowicz, Boleslaw
.
Czym jest współczesna wojna?
., 2016.
Google Scholar
RTF
EndNote XML
5. Meyers, Adam
.
Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units
. CrowdStrike, 2016.
Google Scholar
RTF
EndNote XML
Stoykov, Mitko
.
"
DARI Report on the Results of National Expert Assessment of Institutional Capabilities to Countering Hybrid Threats
." In
International conference “Interagency and International Cooperation in Countering Hybrid Threats"
. Sofia, Bulgaria, 2016.
Google Scholar
RTF
EndNote XML
Kremer, Sibbeline
.
De Veiligheid van Interventie.(Gebrek aan) internationale interventie in Libië en Syrië (2011) in het kader van het defensief realism
. Vol. BA Scriptie. Universiteit Utrecht,, 2016.
Google Scholar
RTF
EndNote XML
van Uhm, Daan
.
"
De Verwevenheid Tussen de Onder- en bovenwereld in de Wildlife Handel
."
Cahiers Politiestudies
1, no. 38 (2016): 41-54.
Google Scholar
RTF
EndNote XML
Raval, Siraj
.
Decentralized Applications: Harnessing Bitcoin's Blockchain Technology
. O'Reilly Media, Inc., 2016.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
151
152
153
154
155
156
157
158
159
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance