Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 4 results:
RTF
EndNote XML
Filters:
Keyword
is
threat
[Clear All Filters]
2022
Posea, Vlad
,
George Sharkov
,
Adrian Baumann
, and
Georgios Chatzichristos
.
"
Towards Unified European Cyber Incident and Crisis Management Ontology
."
Information & Security: An International Journal
53, no. 1 (2022): 33-44.
DOI
Google Scholar
RTF
EndNote XML
2016
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
DOI
Google Scholar
RTF
EndNote XML
2014
Ivanova, Yoana
.
Policies for the Protection of Critical Infrastructure from Cyber Attacks
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2014.
DOI
Google Scholar
RTF
EndNote XML
2013
Dimitrov, Michael
.
Why the Organization Needs Information Security Policy and Programme
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2013.
DOI
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance