Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2019
O’Connor, Cailin
, and
James Owen Weatherall
.
The Misinformation Age: How False Beliefs Spread
. New Haven, CT: Yale University Press, 2019.
Google Scholar
RTF
EndNote XML
Videv, Tihomir
,
Boris Bozveliev
, and
Sotir Sotirov
.
"
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation
."
Information & Security: An International Journal
43, no. 1 (2019): 45-53.
DOI
Google Scholar
RTF
EndNote XML
Gaydarski, Ivan
, and
Zlatogor Minchev
.
Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2019.
DOI
Google Scholar
RTF
EndNote XML
Prav, Roman
.
"
Monitoring of the development of information infrastructure in Ukraine
."
Technology audit and production reserves
3/4, no. 47 (2019): 12-18.
Google Scholar
RTF
EndNote XML
Dudykevych, Valeriy
,
Ivan Prokopyshyn
,
Vasyl Chekurin
,
Ivan Opirskyy
,
Yuriy Lakh
,
Taras Kret
,
Yevheniia Ivanchenko
, and
Ihor Ivanchenko
.
"
A Multicriterial Analysis of the Efficiency of Conservative Information Security Systems
."
Eastern-European Journal of Enterprise Technologies
3, no. 9(99) (2019): 6-13.
DOI
Google Scholar
RTF
EndNote XML
Dieng, Moda
.
"
The Multi-National Joint Task Force and the G5 Sahel Joint Force: The Limits of Military Capacity-Building Efforts
."
Contemporary Security Policy
40, no. 4 (2019): 481-501.
DOI
Google Scholar
RTF
EndNote XML
Deng, Yepeng
,
Chunkai Zhang
, and
Xuan Wang
.
A multi-objective examples generation approach to fool the deep neural networks in the black-box scenario
In
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)
., 2019.
Google Scholar
RTF
EndNote XML
Kamp, Karl-Heinz
.
"
Mythen der Zwei-Prozent-Debatte, Bundesakademie für Sicherheitspolitik
."
Arbeitspapier Sicherheitspolitik
9 (2019).
Google Scholar
RTF
EndNote XML
Gvadzabia, George
.
Nation State Cyber Propaganda Operations
. Utica College, 2019.
Google Scholar
RTF
EndNote XML
National Emergency Supply Agency – Organisation
., 2019.
Google Scholar
RTF
EndNote XML
Kimhi, Shaul
, and
Yarden Oliel
.
"
National Resilience, Country Corruption and Quality of Life: An International Study
."
The International Journal of Social Sciences and Humanities Invention
6, no. 5 (2019): 5430-5436.
DOI
Google Scholar
RTF
EndNote XML
Freedom House
.
Nations in Transit 2018
., 2019.
Google Scholar
RTF
EndNote XML
Davis, Susan
.
NATO in the Cyber Age: Strengthening Security & Defence, Stabilising Deterrence
. NATO Parliamentary Assembly, 2019.
Google Scholar
RTF
EndNote XML
"
NATO’s National Resilience Obligations
."
RUSI Commentary
(2019).
Google Scholar
RTF
EndNote XML
Iskandarov, Khayal
, and
Piotr Gawliczek
.
"
NATO’s Role in Improving Professional Military Education with a Focus on the South Caucasus Countries
."
Connections: The Quarterly Journal
18, no. 3 (2019): 35-44.
DOI
Google Scholar
RTF
EndNote XML
NATO Science & Technology Organization’s Collaborative Program of Work (CPoW)
., 2019.
Google Scholar
RTF
EndNote XML
NATO Science & Technology Organization’s (STO) CPoW Operating Procedures
., 2019.
Google Scholar
RTF
EndNote XML
NATO Warns Russia of ‘Full Range’ of Responses to Cyberattack
. Security Week, 2019.
Google Scholar
RTF
EndNote XML
Mednikarov, Boyan
.
Naval Education in Bulgaria - Current State and Perspectives
. Sofia: Е-литера Софт ЕООД, 2019.
Google Scholar
RTF
EndNote XML
Mednikarov, Boyan
.
Naval Education in Bulgaria - Current State and Perspectives (Военноморското образование в Република България - Състояние и перспективи)
. Варна: Е-литера Софт ЕООД, 2019.
Google Scholar
RTF
EndNote XML
Wiklundh, Kia C.
.
nderstanding the IoT technology LoRa and its interference vulnerability
In
2019 International Symposium on Electromagnetic Compatibility - EMC EUROPE
., 2019.
DOI
Google Scholar
RTF
EndNote XML
NetLogo - Center for Connected Learning and Computer Based Modeling
. Evanston, Illinois, USA: Northwestern University, 2019.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
,
George Sharkov
,
Nikolai Stoianov
, and
Velizar Shalamanov
.
"
Network-based Steering of Bulgaria’s Cybersecurity Research
." In
DIGILIENCE 2019
. Sofia, Bulgaria, 2019.
Google Scholar
RTF
EndNote XML
Rezaeighaleh, Hossein
, and
Cliff C. Zou
.
"
New Secure Approach to Backup Cryptocurrency Wallets
." In
IEEE Global Communications Conference-Communication & Information Systems Security Symposium
., 2019.
Google Scholar
RTF
EndNote XML
Cholakov, Peter
.
Nikolay Banev: rise and fall
. Deutsche Welle, 2019.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
74
75
76
77
78
79
80
81
82
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance