Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2020
Schmitz, Peter
.
Cyberkriminelle nutzen Krise um Coronavirus aus
. SecurityInsider , 2020.
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
,
Sergiy Dotsenko
,
Yuriy Ponochovnyi
, and
Oleg Illiashenko
.
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
."
Information & Security: An International Journal
47, no. 1 (2020): 77-90.
DOI
Google Scholar
RTF
EndNote XML
Cyber-Risikomatrix 2011
., 2020.
Google Scholar
RTF
EndNote XML
CyberSec4Europe Consortium
., 2020.
Google Scholar
RTF
EndNote XML
Cybersecurity Assessment Tool
. Federal Financial Institutions Examination Council (FFIEC), 2020.
Google Scholar
RTF
EndNote XML
Cybersecurity Awareness en Skills in Nederland
. TNS NIPO, 2020.
Google Scholar
RTF
EndNote XML
"
Cybersecurity Capability Maturity Model (C2M2) Program
." US Department of Energy, 2020.
Google Scholar
RTF
EndNote XML
Cybersecurity Capacity Maturity Model for Nations (CMM)
In
Revised Edition
., 2020.
Google Scholar
RTF
EndNote XML
Buntz, Brian
.
Cybersecurity Crisis Management During the Coronavirus Pandemic
. IoT World Today, 2020.
Google Scholar
RTF
EndNote XML
Tomov, Petar
,
Iliyan Zankinski
, and
Todor Balabanov
.
"
Cybersecurity in Donated Distributed Computing for Evolutionary Algorithms
." In
DIGILIENCE 2020
., 2020.
Google Scholar
RTF
EndNote XML
Baezner, Marie
.
"
Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces
."
Connections: The Quarterly Journal
19, no. 1 (2020): 63-72.
DOI
Google Scholar
RTF
EndNote XML
Corallo, Angelo
,
Mariangela Lazoi
, and
Marianna Lezzi
.
"
Cybersecurity in the Context of Industry 4.0: A Structured Classification of Critical Assets and Business Impacts
."
Computers in Industry
114 (2020): 103165.
DOI
Google Scholar
RTF
EndNote XML
Cybersecurity Maturity Model Certification (CMMC)
., 2020.
Google Scholar
RTF
EndNote XML
Mechev, Stoyan
,
Elisaveta Staneva
, and
Mariyan Rachev
.
"
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
."
Information & Security: An International Journal
47, no. 3 (2020): 300-305.
DOI
Google Scholar
RTF
EndNote XML
Atanasov, Stanislav
.
Cybersecurity Risks and Challenges in the Covid-19 Pandemic
In
CSDM Views
., 2020.
DOI
Google Scholar
RTF
EndNote XML
Cybersecurity Risks Increasing During COVID-19 Pandemic
. Shell&Wilmer, 2020.
Google Scholar
RTF
EndNote XML
Boehm, Jim
,
James Kaplan
, and
Nathan Sportsman
.
Cybersecurity’s dual mission during the coronavirus crisis
., 2020.
Google Scholar
RTF
EndNote XML
Boehm, Jim
,
James Kaplan
,
Marc Sorel
,
Nathan Sportsman
, and
Trevor Steen
.
Cybersecurity tactics for coronavirus pandemic
. McKinsey&Company, 2020.
Google Scholar
RTF
EndNote XML
Sharkov, George
,
Yavor Papazov
,
Christina Todorovaa
,
Georgi Koykov
, and
Georgi Zahariev
.
"
Cybersecurity Tools for Threat Intelligence and Vulnerability Monitoring for National and Sectoral Analysis
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2020.
Google Scholar
RTF
EndNote XML
Gourisetti, Sri Nikhil Gup
,
Michael Mylrea
, and
Hirak Patangia
.
"
Cybersecurity Vulnerability Mitigation Framework through Empirical Paradigm: Enhanced Prioritized Gap Analysis
."
Future Generation Computer Systems
105 (2020): 410-431.
DOI
Google Scholar
RTF
EndNote XML
CyRADARS Cyber Rapid Analysis for Defense Awareness of Real-Time Situation
., 2020.
Google Scholar
RTF
EndNote XML
The CyRADARS web site
., 2020.
Google Scholar
RTF
EndNote XML
Gogan, Janis
,
Kieran Conboy
, and
Joseph Weiss
.
Dangerous champions of IT innovation
In
53rd Hawaii International Conference on System Sciences
. Maui, Hawaii, 2020.
Google Scholar
RTF
EndNote XML
Lenk, Peter
,
Michael Street
,
Ivana Ilic Mestric
,
Arvid Kok
,
Giavid Valiyev
,
Philippe Le Cerf
, and
Barbara Lorincz
.
"
Data Science as a Service: The Data Range
."
Information & Security: An International Journal
47, no. 2 (2020): 157-171.
DOI
Google Scholar
RTF
EndNote XML
Borissova, Daniela
,
Magdalena Garvanova
,
Zornitsa Dimitrova
,
Andrea Pandulis
, and
Ivan Garvanov
.
"
Decision Support Framework for Composing of Different Questionnaires Based on Business Model with Optimization
." In
Integrated Uncertainty in Knowledge Modelling and Decision Making
. Springer Nature, 2020.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance