Biblio

Export 21373 results:
2019
Larsen, Marie Hjelseth, and Susann Øvretveit. Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
Si, Katherine. Cosco Shipping Port sells port assets to SIPG. Seatrade Maritime, 2019.
CoSoSys Endpoint Protector Web Page., 2019.
Ponemon Institute & Accenture Security. The Cost of Cybercrime, 2019., 2019.
Counterintelligence. Latvian State Security Service, 2019.
Counterterrorism. Latvian State Security Service, 2019.
Ogar, Sarah. Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Jeżewski, Rosław. "Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study." Connections: The Quarterly Journal 18, no. 1-2 (2019).
Turčaník, Michal, and Martin Javurek. "Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
Kozina, Andrija. "The Culture of Military School: The Example of the Dr. Franjo Tudjman Croatian Defense Academy." Connections: The Quarterly Journal 18, no. 3 (2019): 45-63.
Rahouti, Mohamed, and Kaiqi Xiong. A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019 In Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)., 2019.
NCSC. Cyber Assessment Framework V3.0., 2019.
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019 In Security Report. Check Point Research, 2019.
Tikk, Eneken, Kristine Hovhannisyan, Mika Kerttunen, and Mirva Salminen. Cyber Conflict Fact Book: Effect-Creating State-on-State Cyber Operations. Jyväskylä: Cyber Policy Institute, 2019.
J.P., Kalkman, and Wieskamp L.. "Cyber Intelligence Networks: A Typology." International Journal of Intelligence, Security, and Public Affairs 21, no. 1 (2019): 4-24.
Baskar, Kala, and Mahesh Balakris. "Cyber Preparedness in Maritime Industry." nternational Journal of Scientific and Technical Advancements 5, no. 2 (2019): 19-28.
Kott, Alexander, and Igor Linkov. Cyber Resilience of Systems and Networks. Risk, System and Decisions. Cham: Springer, 2019.
Sharkov, George. "Cyber Resilience of Systems-of-Intelligent-Systems." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Clim, Antonio. "Cyber Security Beyond the Industry 4.0 Era. A Short Review on a Few Technological Promises." Informatica Economică 23, no. 2 (2019).
Yeboah-Ofori, Abel, and Shareeful Islam. "Cyber Security Threat Modeling for Supply Chain Organizational Environments." Future Internet 11, no. 3 (2019): 63.
Pöyhönen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajamäki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256.
Sharkov, George, Yavor Papazov, Christina Todorova, Georgi Koykov, Martin Georgiev, and Georgi Zahariev. Cyber Threat Map for National and Sectoral Analysis In Computer and Communications Engineering, Workshop on Information Security 2019, 9th Balkan Conference in Informatics., 2019.
Shaikh, Siraj Ahmed. "Cyber-Physical Systems Security: Research Challenges and Opportunities.", 2019.
Siregar, Sessika, and Kuo-Chung Chang. "Cybersecurity Agility: Antecedents and Effects on Security Incident Management Effectiveness." In 23rd Pacific Asia Conference on Information Systems (PACIS 2019). China, 2019.
Cybersecurity Capability Maturity Model (C2M2), Version 2.0., 2019.

Pages