Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 1 results:
  • RTF
  • EndNote XML
Filters: Author is Vlad Craioveanu  [Clear All Filters]
2021
Petcu, Ioana, Ionuţ Bogdan Candet, Costin Ştefănescu, Cristian Ionel Gruia, and Vlad Craioveanu. "Security Risks of Cloud Computing Services from the New Cybernetics’ Threats Perspective." Romanian Cyber Security Journal 3, no. 1 (2021): 89-97.
  • Google Scholar
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Cybersecurity Threats and Challenges. International Best Practices

read more >>

Conference on Cybersecurity and Resilience

read more >>

Study on 2035 scenarios on defence resource allocation

read more >>

Contribution to the Inter-Parliamentary Conference on CFSP and CSDP

read more >>

Vol. 29 of I&S on Scenario-based Security Foresight is available online

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -