Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2019
Yeboah-Ofori, Abel
, and
Shareeful Islam
.
"
Cyber Security Threat Modeling for Supply Chain Organizational Environments
."
Future Internet
11, no. 3 (2019): 63.
DOI
Google Scholar
RTF
EndNote XML
Pöyhönen, Jouni
,
Viivi Nuojua
,
Martti Lehto
, and
Jyri Rajamäki
.
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
."
Information & Security: An International Journal
43, no. 2 (2019): 236-256.
DOI
Google Scholar
RTF
EndNote XML
Sharkov, George
,
Yavor Papazov
,
Christina Todorova
,
Georgi Koykov
,
Martin Georgiev
, and
Georgi Zahariev
.
Cyber Threat Map for National and Sectoral Analysis
In
Computer and Communications Engineering, Workshop on Information Security 2019, 9th Balkan Conference in Informatics
., 2019.
Google Scholar
RTF
EndNote XML
Shaikh, Siraj Ahmed
.
"
Cyber-Physical Systems Security: Research Challenges and Opportunities
.", 2019.
Google Scholar
RTF
EndNote XML
Siregar, Sessika
, and
Kuo-Chung Chang
.
"
Cybersecurity Agility: Antecedents and Effects on Security Incident Management Effectiveness
." In
23rd Pacific Asia Conference on Information Systems (PACIS 2019)
. China, 2019.
Google Scholar
RTF
EndNote XML
Cybersecurity Capability Maturity Model (C2M2), Version 2.0
., 2019.
Google Scholar
RTF
EndNote XML
Oloidi, Aramide
.
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
. Vol. PhD dissertation. San Diego, CA: Northcentral University, 2019.
Google Scholar
RTF
EndNote XML
Morris, Gerald F.
.
The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada
. Northcentral University, 2019.
Google Scholar
RTF
EndNote XML
Cybersecurity Considerations for Institutions of Higher Education
., 2019.
Google Scholar
RTF
EndNote XML
Gonzalez, III, Joaquin Jay
, and
Roger L. Kemp
.
Cybersecurity: Current Writings on Threats and Protection
. Jefferson, NC: McFarland, 2019.
Google Scholar
RTF
EndNote XML
Asghar, Muhammad Rizwan
,
Qinwen Hu
, and
Sherali Zeadally
.
"
Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges
."
Computer Networks
165 (2019): 106946.
DOI
Google Scholar
RTF
EndNote XML
Cybersecurity in the shipping industry
In
Capital Link Cyprus Shipping Forum, Deloitte
., 2019.
Google Scholar
RTF
EndNote XML
Cybersecuritymonitor 2019
. CBS, 2019.
Google Scholar
RTF
EndNote XML
"
Cyberspace
." In
The United Nations Terminology Database
., 2019.
Google Scholar
RTF
EndNote XML
Gonçalves, Carlos Pedro
.
"
Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats
." In
Cyberspace
. Books on Demand, 2019.
Google Scholar
RTF
EndNote XML
The National Institute of Standards and Technology
.
Cyberspace (Definition)
., 2019.
Google Scholar
RTF
EndNote XML
Raychev, Yavor
.
"
Cyberwar in Russian and USA Military-Political Thought: A Comparative View
."
Information & Security: An International Journal
43, no. 3 (2019): 349-361.
DOI
Google Scholar
RTF
EndNote XML
CYREX 2018 Web Page
., 2019.
Google Scholar
RTF
EndNote XML
Stein, Silvia
.
Dal Macro al Micro Grilletto: Modello del Stato Mentale come il Variabile Moderante nella Gestione di Conflitti Organizzativi
., 2019.
Google Scholar
RTF
EndNote XML
Zareapoor, Masoumeh
,
Pourya Shamsolmoali
, and
Afshar M. Alam
.
"
Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction
." In
Digital Currency: Breakthroughs in Research and Practice
. IGI Global, 2019.
Google Scholar
RTF
EndNote XML
Richter, Heiko
, and
Peter R. Slowinski
.
"
The Data Sharing Economy: On the Emergence of New Intermediaries
."
International Review of Intellectual Property and Competition Law
50 (2019): 4-29.
DOI
Google Scholar
RTF
EndNote XML
Kim, Dohoon
.
"
Decision-Making Method for Estimating Malware Risk Index
."
Applied Sciences
9, no. 22 (2019): 4943.
DOI
Google Scholar
RTF
EndNote XML
Kveberg, Torbjørn
,
Vårin Alme
, and
Sverre Diesen
.
Defence against foreign influence -a value-based approach to define and assess harm, and to direct defence measures
In
FFI-RAPPORT
. Norwegian Defence Research Establishment (FFI) , 2019.
Google Scholar
RTF
EndNote XML
The Defence Innovation Greenhouse
., 2019.
Google Scholar
RTF
EndNote XML
Defending against today’s critical threats
In
2019 Threat Report
. Cisco, 2019.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
64
65
66
67
68
69
70
71
72
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance