Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2019
Cybersecurity Capability Maturity Model (C2M2), Version 2.0
(link is external)
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Oloidi, Aramide
.
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
. Vol. PhD dissertation. San Diego, CA: Northcentral University, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Morris, Gerald F.
.
The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada
. Northcentral University, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Cybersecurity Considerations for Institutions of Higher Education
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Gonzalez, III, Joaquin Jay
, and
Roger L. Kemp
.
Cybersecurity: Current Writings on Threats and Protection
. Jefferson, NC: McFarland, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Asghar, Muhammad Rizwan
,
Qinwen Hu
, and
Sherali Zeadally
.
"
Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges
."
Computer Networks
165 (2019): 106946.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Cybersecurity in the shipping industry
(link is external)
In
Capital Link Cyprus Shipping Forum, Deloitte
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Cybersecuritymonitor 2019
(link is external)
. CBS, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
"
Cyberspace
(link is external)
." In
The United Nations Terminology Database
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Gonçalves, Carlos Pedro
.
"
Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats
." In
Cyberspace
. Books on Demand, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
The National Institute of Standards and Technology
.
Cyberspace (Definition)
(link is external)
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Raychev, Yavor
.
"
Cyberwar in Russian and USA Military-Political Thought: A Comparative View
."
Information & Security: An International Journal
43, no. 3 (2019): 349-361.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
CYREX 2018 Web Page
(link is external)
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Stein, Silvia
.
Dal Macro al Micro Grilletto: Modello del Stato Mentale come il Variabile Moderante nella Gestione di Conflitti Organizzativi
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Zareapoor, Masoumeh
,
Pourya Shamsolmoali
, and
Afshar M. Alam
.
"
Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction
." In
Digital Currency: Breakthroughs in Research and Practice
. IGI Global, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Richter, Heiko
, and
Peter R. Slowinski
.
"
The Data Sharing Economy: On the Emergence of New Intermediaries
."
International Review of Intellectual Property and Competition Law
50 (2019): 4-29.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Kim, Dohoon
.
"
Decision-Making Method for Estimating Malware Risk Index
."
Applied Sciences
9, no. 22 (2019): 4943.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Kveberg, Torbjørn
,
Vårin Alme
, and
Sverre Diesen
.
Defence against foreign influence -a value-based approach to define and assess harm, and to direct defence measures
In
FFI-RAPPORT
. Norwegian Defence Research Establishment (FFI) , 2019.
Google Scholar
(link is external)
RTF
EndNote XML
The Defence Innovation Greenhouse
(link is external)
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Defending against today’s critical threats
In
2019 Threat Report
. Cisco, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Defense Intelligence and Security Service (MIDD)
(link is external)
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
McKenna, Matthew A.
.
Deficiencies in Electoral Security: Outcomes of the 2007 and 2013 Kenyan Elections
. Vol. Master's thesis. Harvard Extension School, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Berutti, Martin
.
Defining the digital twin: 7 essential steps
(link is external)
. ICE - Institution of Civil Engineers, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Nissen, Christopher A.
,
John E. Gronager
,
Robert S. Metzger
,
Rogers Joseph O’Donnell
, and
Harvey Rishikof
.
Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience
. Washington, DC: MITRE, 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Lunn, Simon
, and
Nicholas Williams
.
The Demise of the INF Treaty: What Are the Consequences for NATO
(link is external)
In
Policy Brief, European Leadership Network
., 2019.
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
65
66
67
68
69
70
71
72
73
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top