Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21329 results:
RTF
EndNote XML
2022
Moon, Bo Ra
,
Seung Min Lee
, and
Won Jae Seo
.
"
Contemporary Safety Management of Virtual Golf in South Korea
."
Journal of Sport and Applied Science
6, no. 1 (2022): 01-04.
Google Scholar
RTF
EndNote XML
Erbasli, Seyma Nur Yildir
.
Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication
In
Department of Educational Psychology
. Vol. Doctor of Philosophy. University of Alberta, 2022.
Google Scholar
RTF
EndNote XML
Heineman, Noelle
, and
John Nomikos
.
"
Counterintelligence In The Balkans And Eastern Mediterranean. The Counterintelligence Methods Of Transnational Groups
." In
International Scientific Conferince Strategies XXI
., 2022.
Google Scholar
RTF
EndNote XML
Blank, Stephen
.
The Critical Black Sea Zone
In
Connections: The Quarterly Journal
. Vol. 21., 2022.
Google Scholar
RTF
EndNote XML
S. Nisha, Shajun
,
Harshal Patil
,
Akash Bag
,
Amarendra Singh
,
Yogendra Kumar
, and
Santosh J Kumar
.
Critical Information Framework against Cyber-Attacks using Artificial Intelligence and Big Data Analytics
In
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
. Greater Noida, India, 2022.
DOI
Google Scholar
RTF
EndNote XML
Ivantsov, Sergey Vyacheslav
, and
Aleksey Valeryevic Saranov
.
"
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States
."
All-Russian Criminological Journal
16, no. 1 (2022): 57-72.
Google Scholar
RTF
EndNote XML
Li, Wei
,
Cheng-shu Wu
, and
Su-mei Ruan
.
"
CUS-RF-Based Credit Card Fraud Detection with Imbalanced Data
."
Journal of Risk Analysis and Crisis Response
12, no. 3 (2022): 110-123 .
Google Scholar
RTF
EndNote XML
Liebetrau, Tobias
.
"
Cyber conflict short of war: a European strategic vacuum
."
European Security
(2022).
Google Scholar
RTF
EndNote XML
Hall, Lynne
,
Samiullah Paracha
,
Gill Hagan-Green
,
Catrina Ure
, and
Phil Jackman
.
Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners
In
35th International BCS Human-Computer Interaction Conference
. Keele: Keele University, 2022.
Google Scholar
RTF
EndNote XML
Mednikarov, Boyan
,
Yuliyan Tsonev
,
Borislav Nikolov
, and
Andon Lazarov
.
"
Cyber Hygiene Issues in the Naval Security Environment
."
Information & Security: An International Journal
53, no. 2 (2022): 205-218.
DOI
Google Scholar
RTF
EndNote XML
Baraković, Sabina
, and
Jasmina Baraković Husić
.
"
Cyber hygiene knowledge, awareness, and behavioral practices of university students
."
Information Security Journal: A Global Perspective
(2022).
Google Scholar
RTF
EndNote XML
Fischerkeller, Michael P.
,
Emily O. Goldman
, and
Richard J. Harknett
.
Cyber Persistence Theory: Redefining National Security in Cyberspace
. Oxford University Press, 2022.
Google Scholar
RTF
EndNote XML
de la Vallée, Paloma
,
Georgios Iosifidis
, and
Wim Mees
.
"
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
."
Information & Security: An International Journal
53, no. 2 (2022): 273-286.
DOI
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard
In
IT4Sec Reports
., 2022.
DOI
Google Scholar
RTF
EndNote XML
Ben Farah, Mohamed Amine
,
Elochukwu Ukwandu
,
Hanan Hindy
,
David Brosset
,
Miroslav Bures
,
Ivan Andonovic
, and
Xavier Bellekens
.
"
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends
."
Information
13, no. 22 (2022).
DOI
Google Scholar
RTF
EndNote XML
Frystatzki, Gerd
.
Cyber-Governance-Struktur im Vergleich
In
Sozialwissenschaftliche Fakultät
. Vol. Bachelorarbeit. Ludwig-Maximilians-Universität München, 2022.
Google Scholar
RTF
EndNote XML
Ungkap, Pana
, and
Therdpong Daengsi
.
"
Cybersecurity Awareness Modeling Associated with Influential Factors Using AHP Technique: A Case of Railway Organizations in Thailand
." In
2022 International Conference on Decision Aid Sciences and Applications (DASA)
. Chiangrai, Thailand, 2022.
Google Scholar
RTF
EndNote XML
Herath, Thilini B. G.
,
Prashant Khanna
, and
Monjur Ahmed
.
"
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
."
Journal of Cybersecurity and Privacy
2 (2022): 1-18.
Google Scholar
RTF
EndNote XML
Wirawan, Deny
,
Budi Pramono
, and
Triyoga Budi Prasetyo
.
"
Defense Diplomacy Strategy in Handling Transnational Crimes at the Sea Borders of Indonesia – Malaysia – Filipina
."
International Journal of Social Science And Human Research
05, no. 02 (2022).
Google Scholar
RTF
EndNote XML
Ouriques, Leandro
,
Carlos Eduardo Barbosa
, and
Geraldo Xexéo
.
"
On the Design of Educational Course of Action Wargaming
."
Developments in Business Simulation and Experiential Learning
49 (2022).
Google Scholar
RTF
EndNote XML
Aaltola, Kirsi
,
Harri Ruoslahti
, and
Jarmo Heinonen
.
Desired Cybersecurity Skills and Skills Acquisition Methods in the Organizations
In
21st European Conference on Cyber Warfare and Security
., 2022.
Google Scholar
RTF
EndNote XML
Alatalo, Janne
,
Tuomo Sipola
, and
Tero Kokkonen
.
Detecting One-Pixel Attacks Using Variational Autoencoders
., 2022.
Google Scholar
RTF
EndNote XML
Alatalo, Janne
,
Tuomo Sipola
, and
Tero Kokkonen
.
"
Detecting One-Pixel Attacks Using Variational Autoencoders
." In
World Conference on Information Systems and Technologies WorldCIST 2022
., 2022.
Google Scholar
RTF
EndNote XML
Nelson, John
.
"
Developing a NATO Intermediate Force Capabilities Concept
."
Connections: The Quarterly Journal
21, no. 2 (2022): 67-84.
DOI
Google Scholar
RTF
EndNote XML
Aferudin, Farouq
, and
Kalamullah Ramli
.
"
The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia
."
Budapest International Research and Critics Institute-Journal (BIRCI-Journal)
5, no. 3 (2022): 22859-22872.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance