Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 2 results:
  • RTF
  • EndNote XML
Filters: Author is Michalis Pavlidis  [Clear All Filters]
2018
Polatidis, Nikolaos, Michalis Pavlidis, and Haralambos Mouratidis. "Cyber-attack Path Discovery in a Dynamic Supply Chain Maritime Risk Management System." Computer Standards & Interfaces 56 (2018): 74-82.
  • DOI
  • Google Scholar
  • RTF
  • EndNote XML
2017
Schauer, Stefan, Martin Stamer, Claudia Bosse, Michalis Pavlidis, Haralambos Mouratidis, Sandra König, and Spyros Papastergiou. An Adaptive Supply Chain Cyber Risk Management Methodology In Hamburg International Conference on Logistics, Project: MITIGATE., 2017.
  • DOI
  • Google Scholar
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

TV interview on the forthcoming NATO summit

read more >>

Driver+ Trial 1

read more >>

Launching the Romanian edition of the BI Compendium

read more >>

Developing and implementing integrity plans in the defence

read more >>

International Cooperation in Responding to Common Challenges and Threats

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -