Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21313 results:
RTF
EndNote XML
2022
Chiao, Yuan-Ming
.
"
Chains, Continuums, and Virtuous Cycles: Parsing Taiwan’s Strategic Narratives and Soft Power Leadership in the Indo-Pacific
."
Connections: The Quarterly Journal
21, no. 1 (2022): 89-103.
DOI
Google Scholar
RTF
EndNote XML
Pandey, Vimal Nayan
.
"
Changing Dimensions of Global Terror in the Twenty-First Century: India’s Strategy and Response
." In
Nontraditional Security Concerns in India
. Singapore: Palgrave Macmillan, 2022.
Google Scholar
RTF
EndNote XML
Mygal, Valeriy
,
Galyna Mygal
, and
Stanislav Mygal
.
"
Cognitive Space for Online and Offline Learning: A Convergent Approach
."
The Educational Review, USA
6, no. 4 (2022): 109-123.
Google Scholar
RTF
EndNote XML
Bhatia, Deepshikha
.
"
A Comprehensive Review on the Cyber Security Methods in Indian Organisation
."
Int. J. Advance Soft Compu. Appl,
14, no. 1 (2022).
Google Scholar
RTF
EndNote XML
Saeed, Khalid
, and
Jiří Dvorský
.
Computer Information Systems and Industrial Management
In
21st International Conference CISIM 2022
. Barranquilla, Colombia, 2022.
Google Scholar
RTF
EndNote XML
Koivisto, Jouni
,
Risto Ritala
, and
Matti Vilkko
.
"
Conceptual model for capability planning in a military context – A systems thinking approach
."
Systems Engineering
(2022): 1-18.
Google Scholar
RTF
EndNote XML
Lawniczak, Brent A.
.
Confronting the Myth of Soft Power in U.S. Foreign Policy
. Rowman & Littlefield, 2022.
Google Scholar
RTF
EndNote XML
Lukichev, P. N.
, and
A. A. Ali
.
"
Consciousness Management by Extremist Organizations With the Means of Internet Communication
."
Humanities of the South of Russia
11 (54), no. 2 (2022).
Google Scholar
RTF
EndNote XML
Budde, Carlos E.
,
Anni Karinsalo
,
Silvia Vidor
,
Jarno Salonen
, and
Fabio Massacci
.
"
Consolidating cybersecurity in Europe: A case study on job profiles assessment
."
Computers & Security
(2022).
Google Scholar
RTF
EndNote XML
Ivanov, Bozhidar
.
"
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment
."
Information & Security: An International Journal
51, no. 1 (2022): 25-35.
Google Scholar
RTF
EndNote XML
Moon, Bo Ra
,
Seung Min Lee
, and
Won Jae Seo
.
"
Contemporary Safety Management of Virtual Golf in South Korea
."
Journal of Sport and Applied Science
6, no. 1 (2022): 01-04.
Google Scholar
RTF
EndNote XML
Erbasli, Seyma Nur Yildir
.
Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication
In
Department of Educational Psychology
. Vol. Doctor of Philosophy. University of Alberta, 2022.
Google Scholar
RTF
EndNote XML
Heineman, Noelle
, and
John Nomikos
.
"
Counterintelligence In The Balkans And Eastern Mediterranean. The Counterintelligence Methods Of Transnational Groups
." In
International Scientific Conferince Strategies XXI
., 2022.
Google Scholar
RTF
EndNote XML
Blank, Stephen
.
The Critical Black Sea Zone
In
Connections: The Quarterly Journal
. Vol. 21., 2022.
Google Scholar
RTF
EndNote XML
S. Nisha, Shajun
,
Harshal Patil
,
Akash Bag
,
Amarendra Singh
,
Yogendra Kumar
, and
Santosh J Kumar
.
Critical Information Framework against Cyber-Attacks using Artificial Intelligence and Big Data Analytics
In
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
. Greater Noida, India, 2022.
DOI
Google Scholar
RTF
EndNote XML
Ivantsov, Sergey Vyacheslav
, and
Aleksey Valeryevic Saranov
.
"
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States
."
All-Russian Criminological Journal
16, no. 1 (2022): 57-72.
Google Scholar
RTF
EndNote XML
Li, Wei
,
Cheng-shu Wu
, and
Su-mei Ruan
.
"
CUS-RF-Based Credit Card Fraud Detection with Imbalanced Data
."
Journal of Risk Analysis and Crisis Response
12, no. 3 (2022): 110-123 .
Google Scholar
RTF
EndNote XML
Liebetrau, Tobias
.
"
Cyber conflict short of war: a European strategic vacuum
."
European Security
(2022).
Google Scholar
RTF
EndNote XML
Hall, Lynne
,
Samiullah Paracha
,
Gill Hagan-Green
,
Catrina Ure
, and
Phil Jackman
.
Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners
In
35th International BCS Human-Computer Interaction Conference
. Keele: Keele University, 2022.
Google Scholar
RTF
EndNote XML
Mednikarov, Boyan
,
Yuliyan Tsonev
,
Borislav Nikolov
, and
Andon Lazarov
.
"
Cyber Hygiene Issues in the Naval Security Environment
."
Information & Security: An International Journal
53, no. 2 (2022): 205-218.
DOI
Google Scholar
RTF
EndNote XML
Baraković, Sabina
, and
Jasmina Baraković Husić
.
"
Cyber hygiene knowledge, awareness, and behavioral practices of university students
."
Information Security Journal: A Global Perspective
(2022).
Google Scholar
RTF
EndNote XML
Fischerkeller, Michael P.
,
Emily O. Goldman
, and
Richard J. Harknett
.
Cyber Persistence Theory: Redefining National Security in Cyberspace
. Oxford University Press, 2022.
Google Scholar
RTF
EndNote XML
de la Vallée, Paloma
,
Georgios Iosifidis
, and
Wim Mees
.
"
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
."
Information & Security: An International Journal
53, no. 2 (2022): 273-286.
DOI
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard
In
IT4Sec Reports
., 2022.
DOI
Google Scholar
RTF
EndNote XML
Ben Farah, Mohamed Amine
,
Elochukwu Ukwandu
,
Hanan Hindy
,
David Brosset
,
Miroslav Bures
,
Ivan Andonovic
, and
Xavier Bellekens
.
"
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends
."
Information
13, no. 22 (2022).
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance