Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2019
Suryotrisongko, Hatma
, and
Yasuo Musashi
.
Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective
In
IEEE 12th Conference on Service-Oriented Computing and Applications
. Kaohsiung, Taiwan, 2019.
DOI
Google Scholar
RTF
EndNote XML
Suryotrisongko, Hatma
, and
Yasuo Musashi
.
"
Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective
." In
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)
. Kaohsiung, Taiwan, 2019.
DOI
Google Scholar
RTF
EndNote XML
Bada, Maria
,
Basie von Solms
, and
Ioannis Agrafiotis
.
"
Reviewing National Cybersecurity Awareness for Users and Executives in Africa
."
arXiv:1910.01005
12, no. 1-2 (2019).
Google Scholar
RTF
EndNote XML
Poble, Dmytro K.
.
Rhetoric on Service of Russia’s Information Warfare
In
Political Communication, Political Discourse and Rhetoric
., 2019.
Google Scholar
RTF
EndNote XML
N.M., Scala
,
Reilly A.C.
,
Goethals P.L.
, and
Cukier M.
.
"
Risk and the Five Hard Problems of Cybersecurity
."
Risk Analysis
39, no. 10 (2019): 2119-2126.
DOI
Google Scholar
RTF
EndNote XML
Risk Management – Risk Assessment Techniques
. International Organization for Standardization , IEC 31010:2019., 2019.
Google Scholar
RTF
EndNote XML
Yanakiev, Yantsislav
, and
Dimitrina Polimirova
.
"
The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria
." In
DIGILIENCE 2019
. Sofia, Bulgaria, 2019.
Google Scholar
RTF
EndNote XML
Walker, Shaun
.
"
Romanian Hospitals in Crisis as Emigration Takes Its Tall
."
The Guardian
(2019).
Google Scholar
RTF
EndNote XML
Smilov, Daniel
.
Rumen Radev: a composition based on the picture of Reshetnikov
. Deutsche Welle, 2019.
Google Scholar
RTF
EndNote XML
Sarbanes-Oxley Act
., 2019.
Google Scholar
RTF
EndNote XML
Satversmes aizsardzības birojs (SAB)
., 2019.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Nikolai Stoianov
.
"
Scoping the Scenario Space for Multi-sector Cybersecurity Analysis
." In
DIGILIENCE 2019
. Sofia, Bulgaria, 2019.
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience” (DIGILIENCE 2020)
."
Information & Security: An International Journal
43, no. 3 (2019): 397-398.
Google Scholar
RTF
EndNote XML
Paunova, Polina
.
The secret diary of Tsvetan Tsvetanov
. Svobodna Evropa, 2019.
Google Scholar
RTF
EndNote XML
Secure Digital Future 21 Web Page
., 2019.
Google Scholar
RTF
EndNote XML
Manoharan, Anto Merline
, and
Vimalathithan Rathinasabapathy
.
"
Secured Communication for Remote Bio-Medical Monitoring System Using LoRa
."
Sensor Letters
17, no. 11 (2019): 888-897.
DOI
Google Scholar
RTF
EndNote XML
Gawliczek, Piotr
.
"
Security Environment Perceived from Innovative Information/ Communications Technology and Social Media Perspective. Towards System Solutions
." In
Security and Russian Threats
, 251-264. Kielce, Poland: Jan Kochanowski University of Kielce, 2019.
Google Scholar
RTF
EndNote XML
Lemmetty, Soila
, and
Kaija Collin
.
"
Self-Directed Learning as a Practice of Workplace Learning: Interpretative Repertoires of Self-Directed Learning in ICT Work
."
Vocations and Learning
(2019): 1-24.
Google Scholar
RTF
EndNote XML
Iliev, Rosen
.
"
Sensors and Sensor Systems in Defence
."
CIO Magazine
7 (2019): 80-84.
Google Scholar
RTF
EndNote XML
Simić, Julija
.
Serbia in the EU in 2025 – Mission (Im)possible
. Euractiv.rs, 2019.
Google Scholar
RTF
EndNote XML
Serbian Anti-govt Protesters Break through Police Cordon & Block Presidential Palace
., 2019.
Google Scholar
RTF
EndNote XML
Molstad, Kristine Sommerstad
.
The Shadow in the Mirror : The Politics and Psychology of the Internalised Double in Chuck Palahniuk’s Fight Club and Jess Walter’s The Zero
. Vol. Master's thesis. University of Agder, 2019.
Google Scholar
RTF
EndNote XML
Bikbulatov, Timur
, and
Ilya Kurochkin
.
"
Simulation of DDoS attack on software defined networks
."
AIP Conference Proceedings
2181, no. 1 (2019): 020022.
Google Scholar
RTF
EndNote XML
Thomson, Iain
.
Sinister Secret Backdoor Found in Networking Gear Perfect for Government Espionage: The Chinese are – Oh no, wait, it's Cisco again
. The Register, 2019.
Google Scholar
RTF
EndNote XML
Commission, European
.
Smart and healthy ageing through people engaging in supportive systems
., 2019.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
77
78
79
80
81
82
83
84
85
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance