Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2022
Krisnata, Rachmanu
,
Agus H. S. Reksoprodjo
, and
Surryanto Djoko Waluyo
.
"
Strategi Pengembangan Kapabilitas Siber Pertahanan Untuk Menghadapi Peperangan Siber (Studi Kasus Pada Pushansiber Kemhan Ri 2020-2021)
."
NUSANTARA : Jurnal Ilmu Pengetahuan Sosial
9, no. 6 (2022).
Google Scholar
RTF
EndNote XML
Nikolic, Nebojsa
.
"
Strategic Management Methods in Support of Defence Preparation against Hybrid Warfare
."
Hungarian Defence Review
1-2 (2022).
Google Scholar
RTF
EndNote XML
Valliou, Maria
,
Alexandros Chronis
,
Panos Kotsampopoulos
,
Bahaa Eltahawy
,
Tero Vartiainen
,
Mike Mekkanen
,
Andrejs Romānovs
,
Jana Bikovska
,
Jānis Pekša
,
Rūta Pirta-Dreimane
et al.
Strategy for Cybersecurity Education in Smart Grids
In
Cybersecurity Curricula Recommendations for Smart Grids (CC-RSG) Erasmus+ Strategic Partnership Project
., 2022.
Google Scholar
RTF
EndNote XML
Ashraf, Imran
,
Yongwan Park
,
Soojung Hur
,
Sung Won Kim
,
Roobaea Alroobaea
,
Yousaf Bin Zikria
, and
Summera Nosheen
.
"
A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry
."
IEEE Transactions on Intelligent Transportation Systems
(2022): 1-14.
Google Scholar
RTF
EndNote XML
Karagiannis, Stylianos
.
Systematic Design, Deployment and Evaluation of Gamified Cybersecurity Learning Environments
In
Department of Informatics
. Corfu, Greece: Ionian University, 2022.
Google Scholar
RTF
EndNote XML
Mwim, Emilia N.
, and
Jabu Mtsweni
.
Systematic Review of Factors that Influence the Cybersecurity Culture
In
HAISA 2022: Human Aspects of Information Security and Assurance
., 2022.
Google Scholar
RTF
EndNote XML
Tibor, Serbakov Márton
.
A szélsőséges terrorista csoportok internethasználatának elemzése
. Vol. PHD. Egyetem Pécsi Tudományegyetem, 2022.
Google Scholar
RTF
EndNote XML
Tortorella, Guilherme
,
Paulo A. Cauchic Miguel
,
Enzo Frazzon
,
Alberto Portioli-Staudacher
, and
Maneesh Kumar
.
"
Teaching and learning of industry 4.0: expectations, drivers, and barriers from a knowledge management perspective
."
Knowledge Management Research & Practice
(2022).
Google Scholar
RTF
EndNote XML
Phuong, Chang
.
Teaching cybersecurity: a project-based learning and guided inquiry collaborative learning approach
. Vol. Doctor of Philosophy in Computational Science. University of Tennessee at Chattanooga Chattanooga, Tennessee , 2022.
Google Scholar
RTF
EndNote XML
Kouka, Marianna
, and
Mariah Cristina Magallanes
.
Technological Trivergence and International Trade: A Literature Review
. Harvard University, 2022.
Google Scholar
RTF
EndNote XML
Scott, Nicholas V.
.
A Theoretical Formulism for Evidential Reasoning and Logic Based Bias Reduction in Geo-Intelligence Processing
In
4 th International Conference on Statistics: Theory and Applications (ICSTA'22)
. Prague, Czech Republic, 2022.
Google Scholar
RTF
EndNote XML
Akbari, Abed
.
Think Tank Diplomacy as an Essential Factor Contributing to Iran-Tajikistan Relations
In
International Relations And Security
., 2022.
Google Scholar
RTF
EndNote XML
Dash, Bibhu
,
Meraj Farheen Ansari
,
Pawankumar Sharma
, and
Azad Ali
.
"
Threats and opportunities with ai-based cyber security intrusion detection: a review
."
International Journal of Software Engineering & Applications (IJSEA)
13, no. 5 (2022).
Google Scholar
RTF
EndNote XML
Nganga, Allan
,
Joel Scanlan
,
Margareta Lützhöft
, and
Steven Mallam
.
Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
In
CYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems
., 2022.
Google Scholar
RTF
EndNote XML
Sharkov, George
,
Christina Todorova
,
Georgi Koykov
, and
Ivan Nikolov
.
"
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
."
Information & Security: An International Journal
53, no. 2 (2022): 287-302.
DOI
Google Scholar
RTF
EndNote XML
Sifata, Mhamud Hussen
,
Safwat Mukarrama Choudhury
,
Sajal K. Das
,
Hafiz Ahamed
,
S. M. Muyeen
,
Mehedi Hasan
,
Firoj Ali
,
Zinat Tasneem
,
Manirul Islam
,
Robiul Islam
et al.
Towards Electric Digital Twin Grid: Technology and Framework Review
., 2022.
Google Scholar
RTF
EndNote XML
Sifat, Mhamud Hussen
,
Safwat Mukarrama Choudhury
,
Sajal K. Das
,
Hafiz Ahamed
,
S.M. Muyeen
,
Mehedi Hasan
,
Firoj Ali
,
ZinatT asneem
,
Manirul Islam
,
Robiul Islam
et al.
"
Towards electric digital twin grid: Technology and framework review
."
Journal Pre-proof
(2022).
Google Scholar
RTF
EndNote XML
Posea, Vlad
,
George Sharkov
,
Adrian Baumann
, and
Georgios Chatzichristos
.
"
Towards Unified European Cyber Incident and Crisis Management Ontology
."
Information & Security: An International Journal
53, no. 1 (2022): 33-44.
DOI
Google Scholar
RTF
EndNote XML
Samkari, Esraa
, and
Norah Farooqi
.
"
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm
."
Information & Security: An International Journal
51 (2022): 79-88.
Google Scholar
RTF
EndNote XML
Gaidarski, Ivan
, and
Pavlin Kutinchev
.
"
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
."
Information & Security: An International Journal
53, no. 1 (2022): 65-77 .
DOI
Google Scholar
RTF
EndNote XML
Tosun, Petek
.
"
Transforming Universities for a More Competent Society: Digitalization and Higher Education
." In
Multidisciplinary Perspectives Towards Building a Digitally Competent Society
, 230-247., 2022.
Google Scholar
RTF
EndNote XML
Luo, Tian
.
Translation, Reception and Canonization of The Art of War: Reviving Ancient Chinese Strategic Culture
. Routledge, 2022.
Google Scholar
RTF
EndNote XML
Bülbül, Nurefşan Sertbaş
,
Orhan Ermis
,
Şerif Bahtiyar
,
Ufuk M. Çağlayan
, and
Fatih Alagöz
.
Trust Enhanced Security for Routing in SDN
In
2022 1st International Conference on 6G Networking (6GNet)
. Paris, France, 2022.
Google Scholar
RTF
EndNote XML
Derleth, Jim
, and
Jeff Pickler
.
"
Twenty-first Century Threats Require Twenty-first Century Deterrence
."
Connections: The Quarterly Journal
21, no. 2 (2022): 11-23.
DOI
Google Scholar
RTF
EndNote XML
Barea, Juan Carlos Cas
.
Un Enfoque Propio para el Análisis de la Política Pública de Defensa [A Particular Approach to the Analysis of Defence Public Policy]
In
Actas XIV Jornadas de Estudios de Seguridad «La Competición Estratégica en El Magreb: Argelia y Marruecos Relaciones e Intereses Para España»
., 2022.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance