Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2021
Williams, Heather J..
,
Alexanda T.. Evans
,
Jami E. Ryan
,
Erik E. Mueller
, and
Bryce Downin
.
"
The Online Extremist Ecosystem
."
Perspective - Expert insights on a timely policy issue
(2021).
Google Scholar
RTF
EndNote XML
Xue, Yuan
,
Shouxin Wang
,
Tian Chen
,
Quanxin Zhang
,
Lu Liu
, and
Yu-an Tan
.
"
On-line Firmware Updating and Fingerprint Generating for Solid State Disks
." In
International Conference on Data Mining and Big Data. DMBD 2021
., 2021.
Google Scholar
RTF
EndNote XML
Tovares, Alla
.
"
Online Political Trolling as Bakhtin's Carnival: Putin's “Discrowning” by Pro-Ukrainian Commenters
." In
Approaches to Discourse Analysis
., 2021.
Google Scholar
RTF
EndNote XML
Wen, Shao-Fang
,
Muhammad Mudassar Yamin
, and
Basel Katt
.
Ontology-Based Scenario Modeling for Cyber Security Exercise
In
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
. Vol. 1., 2021.
Google Scholar
RTF
EndNote XML
Tian, Hua
.
"
Optimization of Hybrid Multimedia Art and Design Teaching Mode in the Era of Big Data
."
Scientific Programming for Fuzzy System Modeling of Complex Industry Data
2021 (2021).
Google Scholar
RTF
EndNote XML
Aguilara, Sergio Luiz Cruz
, and
Julia Mori Aparecido
.
"
Organizações internacionais e covid-19: a (in)ação do Conselho de Segurança das Nações Unidas durante a pandemia
."
Revista de Relaciones Internacionales, Estrategia y Seguridad
16, no. 2 (2021).
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
An Organizational Cybersecurity Program
In
IT4Sec Reports
., 2021.
DOI
Google Scholar
RTF
EndNote XML
Puchkov, Oleksandr
,
Dmytro Lande
,
Ihor Subach
,
Mykhailo Boliukh
, and
Dmytro Nahornyi
.
"
OSINT investigation to detect and prevent cyber attacks and cyber security incidents
."
Information Technology and Security
9, no. 2 (2021).
Google Scholar
RTF
EndNote XML
Mùrino, G
,
M Ribaudo
,
SP Romano
, and
A Tacchella
.
"
OT Cyber Security Frameworks Comparison Tool (CSFCTool)
." In
ITASEC’21, Italian Conference on Cybersecurity,
., 2021.
Google Scholar
RTF
EndNote XML
Utakrit, Nathaporn
.
"
Overlapping Concept to Action Between Information Assurance and Information Security
."
Information Technology Journal
(2021).
Google Scholar
RTF
EndNote XML
Nicholas, J.
.
"
P24 The Hidden Logic of Disinformation and the Prioritization of Alternatives
."
The Whitehead Journal of Diplomacy and International Relations
4, no. 1 (2021).
Google Scholar
RTF
EndNote XML
Makarjan, Hajk
, and
Jonas Rybråten
.
På hvilken måte kan russiske aktive tiltak bidra til å oppnå Russlands målsettinger på Svalbard?
., 2021.
Google Scholar
RTF
EndNote XML
Ramakrishnan, Karthik
,
P Gokul
, and
Rohan Nigam
.
Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring
In
2021 International Conference on Forensics, Analytics, Big Data, Security (FABS)
. Bengaluru, India, 2021.
Google Scholar
RTF
EndNote XML
LuisaFranchina
,
Giulia Inzerilli
,
Enrico Scatto
,
Alessandro Calabrese
,
Andrea Lucariello
,
Giulia Brutti
, and
Priscilla Roscioli
.
"
Passive and active training approaches for critical infrastructure protection
."
International Journal of Disaster Risk Reduction
63 (2021).
Google Scholar
RTF
EndNote XML
Peou, Sorpong
.
Peace and Security in Indo-Pacific Asia: IR Perspectives in Context
. London: Routledge, 2021.
Google Scholar
RTF
EndNote XML
Iqbal, Ishtiaq
,
Sonia Afroz
, and
Intisar Kabir
.
"
Plan a Condensed Risk Model using Fuzzy Logic for Natural Disaster Management
."
International Journal of Engineering Research & Technology (IJERT)
10, no. 04 (2021).
Google Scholar
RTF
EndNote XML
Penchev, Georgi
.
"
Planning and Implementing Change in Cyber Security Network Organisations
."
Information & Security: An International Journal
50, no. 1 (2021): 89-101 .
DOI
Google Scholar
RTF
EndNote XML
Shires, James
.
The Politics of Cybersecurity in the Middle East
., 2021.
Google Scholar
RTF
EndNote XML
Dias, Luís Filipe Xav
.
A prevenção e o combate de ameaças híbridas: identificar instrumentos de medida: variáveis e indicadores de resiliência nacionais face às ameaças híbridas (informacional)
In
Departamento De Estudos Pós-Graduados
. Pedrouços: Instituto Universitário Militar , 2021.
Google Scholar
RTF
EndNote XML
Fernandes, Nuno Fernando R.
.
A prevenção eo combate de ameaças híbridas: identificar instrumentos de medida: variáveis e indicadores de resiliência do instrumento de poder económico face às ameaças híbridas
In
Departamento De Estudos Pós-Graduados
. Pedrouços : Instituto Universitário Militar, 2021.
Google Scholar
RTF
EndNote XML
Vuletic, Dejan
, and
Branislav Đorđević
.
"
Problemi i izazovi upravljanja internetom na međunarodnom nivou
."
Medjunarodni problemi
LXXIII, no. 2 (2021): 235-258.
Google Scholar
RTF
EndNote XML
Apte, Tejaswini
, and
Sarika Sharma
.
"
Progression in Cyber Security Concerns for Learning Management Systems: Analyzing the Role of Participants
." In
Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0
. CRC Press, 2021.
Google Scholar
RTF
EndNote XML
Erlich, Aaron
, and
Calvin Garner
.
"
Is pro-Kremlin Disinformation Effective? Evidence from Ukraine
."
The International Journal of Press/Politics
(2021): 1-24.
DOI
Google Scholar
RTF
EndNote XML
Burmaka, Ivan
,
Nicolai Stoianov
,
Vitalii Lytvynov
,
Mariia Dorosh
, and
Svitlana Lytvyn
.
"
Proof of Stake for Blockchain Based Distributed Intrusion Detecting System
." In
Advances in Intelligent Systems and Computing 1265
, 237-247. Cham: Springer, 2021.
DOI
Google Scholar
RTF
EndNote XML
Ferraro, Giulia
.
"
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination
."
Information & Security: An International Journal
48, no. 2 (2021): 171-183.
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance