Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 15 results:
RTF
EndNote XML
Filters:
Keyword
is
Risk
[Clear All Filters]
2022
Georgiev, Venelin
.
Productive and Counter-Productive Balance in Security
In
CSDM Views
., 2022.
Google Scholar
(link is external)
RTF
EndNote XML
2021
Georgiev, Venelin
.
A Conceptual Model for Resilience in the field of Secuirty
In
IT4Sec Reports
., 2021.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Georgiev, Venelin
.
Main Issues and Risks Related to the Provision of Resources for Bulgaria’s Defence Capabilities Development Programme 2032
In
CSDM Views
., 2021.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2018
Tagarev, Todor
.
"
Hybrid Warfare: Emerging Research Topics
."
Information & Security: An International Journal
39, no. 3 (2018): 289-300.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Samberg, Andre
.
"
Smart Solutions for Sustainable Emergency and Crisis Management
."
Information & Security: An International Journal
40, no. 1 (2018): 5-8.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2016
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2015
Georgiev, Venelin
.
Levels of Cybersecurity Training and Education
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2015.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Georgiev, Venelin
.
A Two-Level Model for Describing the Risk Profile in Formulating Policy and Developing Security Capabilities
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
2014
Monev, Veselin
.
Enterprise IT security metrics: Classification, examples and characteristics (in Bulgarian)
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2014.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Ivanova, Yoana
.
Policies for the Protection of Critical Infrastructure from Cyber Attacks
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2014.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2013
Milina, Velichka
.
Cybersecurity: A National Strategic Issue
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2013.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2012
Gorbenko, Anatoliy
,
Vyacheslav Kharchenko
,
Olga Tarasyuk
, and
Alexander Romanovsky
.
"
Intrusion-Avoidance via System Diversity
."
Information & Security: An International Journal
28, no. 1 (2012): 154-158.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Procházková, Dana
.
"
Overview of Fine Exact Methods of Safety Engineering
."
Information & Security: An International Journal
28, no. 2 (2012): 167-178.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Procházková, Dana
.
"
Principles of Mitigating and Managing Human System Risks
."
Information & Security: An International Journal
28, no. 1 (2012): 21-36.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2009
Stankov, Gueorgui
.
"
Risk as a Factor in Decision-Making
."
Information & Security: An International Journal
23, no. 2 (2009): 224-233.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top