Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2021
Павлова-Трайкова, Ели
, and
Иван Ц. Маринов
.
"
Оценка на ерозионния риск в горските територии от водосбора на река Отовица, приток на Джерман
."
FOREST SCIENCE
2 (2021).
Google Scholar
RTF
EndNote XML
Pitkevich, P.
.
"
Принципи захисту від несанкціонованого доступу до ресурсів системи хмарних обчислень
."
Computer-Integrated Technologies
(2021).
Google Scholar
RTF
EndNote XML
Вахью, И.
.
Проблема международных киберугроз для критической информационной инфраструктуры национальных государств и проблема выработки эффективных международных мер противодействия
. Vol. бакалавр. Томск: Томский Государствнный Университет, 2021.
Google Scholar
RTF
EndNote XML
Таныгин, М. О.
,
Л. С. Крыжевич
, and
П. С. Зыков
.
"
Разработка генератора псевдослучайных чисел на основе кубических радикалов
."
Известия Юго-Западного государственного университета
25, no. 4 (2021).
Google Scholar
RTF
EndNote XML
Вікторівна, Антипенко Ірина
.
Управління Політичними Ризиками В Умовах Глобалізації
. Vol. Дисертація. Київ: Національна Академія Державного Управління при Президентові України, 2021.
Google Scholar
RTF
EndNote XML
Чечуй, ОВ
,
ДС Комін
, and
ВД Ревенко
.
"
Формалізована модель оцінки гарантій інформаційної безпеки в системах захищеної ІР-телефонії
."
Збірник наукових праць Харківського національного університету Повітряних Сил
3, no. 69 (2021).
Google Scholar
RTF
EndNote XML
Митровић, Мирослав
, and
Небојша Николић
.
Хибридни рат – допринос дефинисању концепта, садржаја и модела деловања
. Београд, 2021.
Google Scholar
RTF
EndNote XML
2020
Sonatype
.
2020 State of the Software Supply Chain Report
., 2020.
Google Scholar
RTF
EndNote XML
Kerigan-Kyrou, Dinos
.
"
2020 Transatlantic Security Jam: Resilience Going Forward
."
Connections: The Quarterly Journal
19, no. 3 (2020): 47-54.
DOI
Google Scholar
RTF
EndNote XML
Caruana, Matthew
, and
Joseph G. Vella
.
"
3D Facial Reconstruction from 2D Portrait Imagery
."
Information & Security: An International Journal
47, no. 3 (2020): 328-340.
DOI
Google Scholar
RTF
EndNote XML
Mygal, Valeriy
,
Ihor Klymenko
, and
Galyna Mygal
.
"
3D-Modeling of the Dynamics of Real Processes of Different Nature
." In
ntegrated Computer Technologies in Mechanical Engineering - 2020. ICTM 2020
., 2020.
Google Scholar
RTF
EndNote XML
Kush, OLeksiy
.
70% in the risk zone. What to do in Ukraine with a shaft of new unemployed
. dsnews, 2020.
Google Scholar
RTF
EndNote XML
8 Maritime Systems That Ensures Ship Safety and Security
. Marin Insight, 2020.
Google Scholar
RTF
EndNote XML
Bellardo, John
, and
Stefan Savage
.
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
. San Diego: Department of Computer Science and Engineering, University of California, 2020.
Google Scholar
RTF
EndNote XML
Serpetova, Lejla
.
AB genişleme sürecinde Batı Balkan Ülkelerinin siyasi ve ekonomik değişimleri
. Vol. Yüksek lisans tezi., 2020.
Google Scholar
RTF
EndNote XML
Kelly, Amanda M.
.
The Ability to Protect Against Insider Threats Introduced via Bring Your Own Device
In
School of Business and Technology
. Vol. Doctor of Information Technology., 2020.
Google Scholar
RTF
EndNote XML
Nacheva, Radka
,
Adam Stecyk
, and
Pavel Petrov
.
"
An Accessibility Heuristic Evaluation of Bulgarian and Polish Academic Web Sites: Visually Impaired Users' Perspective
." In
DIGILIENCE 2020
., 2020.
Google Scholar
RTF
EndNote XML
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
DOI
Google Scholar
RTF
EndNote XML
Rono, EK
.
Adoption of Computer Use by Police in Crime Management in Nairobi City County Kenya
., 2020.
Google Scholar
RTF
EndNote XML
Ferraro, Giulia
.
"
After the Crisis: The Role of Resilience in Coming Back Stronger
."
Connections: The Quarterly Journal
19, no. 4 (2020): 97-107.
DOI
Google Scholar
RTF
EndNote XML
Waller, Javaughn
.
Airpower Theory and Hybrid Warfare: Warden's Five Rings
. Vol. Master. Baltimore, Maryland: Johns Hopkins University, 2020.
Google Scholar
RTF
EndNote XML
Dimitrov, Georgi
, and
Avgustin Hristov
.
"
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services
."
Information & Security: An International Journal
47, no. 3 (2020): 341-348.
DOI
Google Scholar
RTF
EndNote XML
Busch, Gary
.
America’s failed seaports – Trump’s ‘America First’ policy isn’t the only barrier to free trade
. Lima Charlie News, 2020.
Google Scholar
RTF
EndNote XML
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
DOI
Google Scholar
RTF
EndNote XML
James, Jason E.
.
Analysis of Security Features and Vulnerabilities in Public/Open Wi-Fi
In
2020 Proceedings of the Conference on Information Systems Applied Research
., 2020.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance