Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 12 results:
RTF
EndNote XML
Filters:
Keyword
is
cybercrime
[Clear All Filters]
2023
Antonova, Gergana
,
Niya Prisadashka
,
Radoslav Dimitrov
,
Ioan Yonkov
,
Daniel Radev
,
Hristo Pavlov
,
Mario Mladenov
, and
Ilian Grigorov
.
Cybercrime Strategy (modeling example)
In
IT4Sec Reports
., 2023.
DOI
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Localism in cybersecurity – mission impossible
In
IT4Sec Reports
., 2023.
DOI
Google Scholar
RTF
EndNote XML
Costigan, Sean S.
.
"
Sovereign or Global Internet? Russia and China Press for Cybercrime Treaty: An Update
."
Connections: The Quarterly Journal
22, no. 1 (2023): 91-98.
DOI
Google Scholar
RTF
EndNote XML
2022
Almén, Casper
,
Nicholas Hagström
, and
Jyri Rajamäki
.
"
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector
."
Information & Security: An International Journal
53, no. 1 (2022): 11-20.
DOI
Google Scholar
RTF
EndNote XML
Rajamäki, Jyri
,
Iiro Lahti
, and
Johanna Parviainen
.
"
OSINT on the Dark Web: Child Abuse Material Investigations
."
Information & Security: An International Journal
53, no. 1 (2022): 21-32.
DOI
Google Scholar
RTF
EndNote XML
2021
Vilím, Lukáš
.
"
Evolution of Police Roles in Combatting Cybercrime in the Czech Republic, 2015-2020
."
Connections: The Quarterly Journal
20, no. 2 (2021): 15-20.
DOI
Google Scholar
RTF
EndNote XML
Costigan, Sean S.
.
"
Sovereign or Global Internet? Russia and China Press for Cybercrime Treaty
."
Connections: The Quarterly Journal
20, no. 2 (2021): 9-13.
DOI
Google Scholar
RTF
EndNote XML
2020
Boshnakova, Gabriela
.
Cyber threats modification during the COVID-19. Cyber pandemia
In
IT4Sec Reports
., 2020.
DOI
Google Scholar
RTF
EndNote XML
2019
Georgiev, Venelin
.
"
Profiling Human Roles in Cybercrime
."
Information & Security: An International Journal
43, no. 2 (2019): 145-160.
DOI
Google Scholar
RTF
EndNote XML
2015
Rademaker, Michel
, and
Marc Gauw
.
"
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
."
Information & Security: An International Journal
32, no. 1 (2015): 65-70.
DOI
Google Scholar
RTF
EndNote XML
2014
Petrov, Valentyn
.
"
Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform
."
Information & Security: An International Journal
31 (2014): 73-77.
DOI
Google Scholar
RTF
EndNote XML
2013
Urciuoli, Luca
,
Toni Männistö
,
Juha Hintsa
, and
Tamanna Khan
.
"
Supply Chain Cyber Security – Potential Threats
."
Information & Security: An International Journal
29, no. 1 (2013): 51-68.
DOI
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance