Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 10 results:
RTF
EndNote XML
Filters:
Keyword
is
machine learning
[Clear All Filters]
2022
Ronchi, Alfredo M.
.
"
Human Factor, Resilience, and Cyber/Hybrid Influence
."
Information & Security: An International Journal
53, no. 2 (2022): 221-239.
DOI
Google Scholar
RTF
EndNote XML
2021
Turčaník, Michal
.
"
Network User Behaviour Analysis by Machine Learning Methods
."
Information & Security: An International Journal
50, no. 1 (2021): 66-78 .
DOI
Google Scholar
RTF
EndNote XML
2020
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
DOI
Google Scholar
RTF
EndNote XML
Tagarev, Todor
,
George Sharkov
, and
Andon Lazarov
.
"
Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions
."
Information & Security: An International Journal
47, no. 1 (2020): 7-10.
DOI
Google Scholar
RTF
EndNote XML
Kok, Arvid
,
Ivana Ilic Mestric
,
Giavid Valiyev
, and
Michael Street
.
"
Cyber Threat Prediction with Machine Learning
."
Information & Security: An International Journal
47, no. 2 (2020): 203-220.
DOI
Google Scholar
RTF
EndNote XML
Lenk, Peter
,
Michael Street
,
Ivana Ilic Mestric
,
Arvid Kok
,
Giavid Valiyev
,
Philippe Le Cerf
, and
Barbara Lorincz
.
"
Data Science as a Service: The Data Range
."
Information & Security: An International Journal
47, no. 2 (2020): 157-171.
DOI
Google Scholar
RTF
EndNote XML
Valiyev, Giavid
,
Marcello Piraino
,
Arvid Kok
,
Michael Street
,
Ivana Ilic Mestric
, and
Retzius Birger
.
"
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies
."
Information & Security: An International Journal
47, no. 2 (2020): 187-202.
DOI
Google Scholar
RTF
EndNote XML
Sipola, Tuomo
,
Samir Puuska
, and
Tero Kokkonen
.
"
Model Fooling Attacks Against Medical Imaging: A Short Survey
."
Information & Security: An International Journal
46, no. 2 (2020): 215-224.
DOI
Google Scholar
RTF
EndNote XML
Bajor, Michał
, and
Marcin Niemiec
.
"
A New Steganographic Algorithm for Hiding Messages in Music
."
Information & Security: An International Journal
47, no. 2 (2020): 261-275.
DOI
Google Scholar
RTF
EndNote XML
2018
Kamenov, Dimitar
.
"
Intelligent Methods for Big Data Analytics and Cyber Security
."
Information & Security: An International Journal
39, no. 3 (2018): 255-262.
DOI
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance