Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2020
Kovács, Attila Máté
.
"
Stranger Things – Threats And Opportunities Related To The Internet Of Things
."
Information and Communication Security
1 (2020).
Google Scholar
RTF
EndNote XML
Kovács, Attila Máté
.
"
Stranger Things – Threats and Opportunities Related to the Internet of Things
."
National Security Review
1 (2020): 165-177.
Google Scholar
RTF
EndNote XML
Libel, Tamir
.
"
Strategic culture as a (discursive) institution: a proposal for falsifiable theoretical model with computational operationalization
."
Defence Studies
20, no. 4 (2020).
Google Scholar
RTF
EndNote XML
Idahosa, Martins Donbruce
.
Strategies for Implementing Successful IT Security Systems in Small Businesses
In
Information Systems and Technology
. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2020.
Google Scholar
RTF
EndNote XML
Strategies for Incident Response and Cyber Crisis Cooperation
. ENISA, 2020.
Google Scholar
RTF
EndNote XML
Pascu, Ioan Mircea
, and
Nicolae-Sergiu Vintila
.
"
Strengthening the Resilience of Political Institutions and Processes: A Framework of Analysis
."
Connections: The Quarterly Journal
19, no. 3 (2020): 55-66.
DOI
Google Scholar
RTF
EndNote XML
Shaw, D.
,
A. Fattoum
,
J. Moreno
, and
J. Bealt
.
"
A Structured Methodology to Peer Review Disaster Risk Reduction Activities: The Viable System Review
."
International Journal of Disaster Risk Reduction 2020
46, no. 101486 (2020).
DOI
Google Scholar
RTF
EndNote XML
Surgisphere: governments and WHO changed Covid-19 policy based on suspect da-ta from tiny US company
. Guardian, 2020.
Google Scholar
RTF
EndNote XML
Bridges, Robert
,
Tarrah Glass-Vanderlan
,
Michael Iannacone
,
Maria Vincent
, and
Qian Chen
.
"
Survey of Intrusion Detection Systems Leveraging Host Data
."
ACM Comput. Surv.
52, no. 6 (2020).
DOI
Google Scholar
RTF
EndNote XML
Yu, Miao
,
Jianwei Zhuge
,
Ming Cao
,
Zhiwei Shi
, and
Lin Jiang
.
"
A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices
."
Future Internet
12, no. 2 (2020): article 27.
DOI
Google Scholar
RTF
EndNote XML
Nosratabadi, Saeed
,
Gergo Pinter
,
Amir Mosavi
, and
Sandor Semperger
.
"
Sustainable Banking; Evaluation of the European Business Models
."
Sustainability
12, no. 6 (2020): 2314.
DOI
Google Scholar
RTF
EndNote XML
Ding, Xinyi
,
Zohreh Raziei
,
Eric C. Larson
,
Eli V. Olinick
,
Paul Krueger
, and
Michael Hahsler
.
"
Swapped face detection using deep learning and subjective assessment
."
EURASIP Journal on Information Security
2020, no. 6 (2020).
Google Scholar
RTF
EndNote XML
Lande, Dmytro
,
Igor Subach
, and
Alexander Puchkov
.
"
A System for Analysis of Big Data from Social Media
."
Information & Security: An International Journal
47, no. 1 (2020): 44-61.
DOI
Google Scholar
RTF
EndNote XML
Estay, Daniel A. Sepúlv
,
Rishikesh Sahay
,
Michael B. Barfod
, and
Christian D. Jensen
.
"
A Systematic Review of Cyber-resilience Assessment Frameworks
."
Computers & Security
97 (2020): 101996.
DOI
Google Scholar
RTF
EndNote XML
Staneva, Elisaveta
, and
Mariyan Rachev
.
"
Tactical Approach to Cyber Defence in IoT Computer Networks
."
Information & Security: An International Journal
47, no. 1 (2020): 135-140.
DOI
Google Scholar
RTF
EndNote XML
Najibullah, Farangis
.
Tajik Workers Face Dire Future as Russia Closes Borders Over Coronavirus
. Radio Free Europe/ Radio Liberty, 2020.
Google Scholar
RTF
EndNote XML
McKay, B.
, and
K. McKay
.
"
The Tao of Boyd: How to Master the OODA Loop.
." In
The Art of Manliness
., 2020.
Google Scholar
RTF
EndNote XML
Bolton, Derek
.
"
Targeting Ontological Security: Information Warfare in the Modern Age
."
Political Psychology
(2020).
DOI
Google Scholar
RTF
EndNote XML
Ronchi, Alfredo M.
.
"
TAS: Trust Assessment System
."
Information & Security: An International Journal
44 (2020): 62-75.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Valeri Ratchev
.
"
A Taxonomy of Crisis Management Functions
."
Sustainability
12, no. 12 (2020).
DOI
Google Scholar
RTF
EndNote XML
Fernández-Caramés, Tiago M.
, and
Paula Fraga-Lamas
.
"
Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
."
Sensors
20, no. 11 (2020): 3048.
DOI
Google Scholar
RTF
EndNote XML
Ahmed, Ali
,
Karsten Lundqvist
,
Craig Watterson
, and
Nilufar Baghaei
.
"
Teaching Cyber-Security for Distance Learners: A Reflective Study
." In
2020 IEEE Frontiers in Education Conference (FIE)
. Uppsala, Sweden, 2020.
DOI
Google Scholar
RTF
EndNote XML
Nzioki, Veronica Waeni
.
"
Technology as a Resilience Factor in Peace Operations
."
Connections: The Quarterly Journal
19, no. 4 (2020): 69-85.
DOI
Google Scholar
RTF
EndNote XML
Ten Things You Can Learn from Women’s Resilience that Help You Stay Strong in the Time of Covid-19
. UN Women, 2020.
Google Scholar
RTF
EndNote XML
Olu-Adeyemi, Lanre
, and
Shaibu Makanjuaola
.
"
Is there a Borderline in Nigeria’s North-East: Multinational Joint Task Force and Counterinsurgency Operation in Perspective
."
African Journal of Political Science and International Relations
14, no. 2 (2020): 33-45.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
55
56
57
58
59
60
61
62
63
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance