Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2019
Cybersecurity Capability Maturity Model (C2M2), Version 2.0
., 2019.
Google Scholar
RTF
EndNote XML
Oloidi, Aramide
.
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study
. Vol. PhD dissertation. San Diego, CA: Northcentral University, 2019.
Google Scholar
RTF
EndNote XML
Morris, Gerald F.
.
The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada
. Northcentral University, 2019.
Google Scholar
RTF
EndNote XML
Cybersecurity Considerations for Institutions of Higher Education
., 2019.
Google Scholar
RTF
EndNote XML
Gonzalez, III, Joaquin Jay
, and
Roger L. Kemp
.
Cybersecurity: Current Writings on Threats and Protection
. Jefferson, NC: McFarland, 2019.
Google Scholar
RTF
EndNote XML
Asghar, Muhammad Rizwan
,
Qinwen Hu
, and
Sherali Zeadally
.
"
Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges
."
Computer Networks
165 (2019): 106946.
DOI
Google Scholar
RTF
EndNote XML
Cybersecurity in the shipping industry
In
Capital Link Cyprus Shipping Forum, Deloitte
., 2019.
Google Scholar
RTF
EndNote XML
Cybersecuritymonitor 2019
. CBS, 2019.
Google Scholar
RTF
EndNote XML
"
Cyberspace
." In
The United Nations Terminology Database
., 2019.
Google Scholar
RTF
EndNote XML
Gonçalves, Carlos Pedro
.
"
Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats
." In
Cyberspace
. Books on Demand, 2019.
Google Scholar
RTF
EndNote XML
The National Institute of Standards and Technology
.
Cyberspace (Definition)
., 2019.
Google Scholar
RTF
EndNote XML
Raychev, Yavor
.
"
Cyberwar in Russian and USA Military-Political Thought: A Comparative View
."
Information & Security: An International Journal
43, no. 3 (2019): 349-361.
DOI
Google Scholar
RTF
EndNote XML
CYREX 2018 Web Page
., 2019.
Google Scholar
RTF
EndNote XML
Stein, Silvia
.
Dal Macro al Micro Grilletto: Modello del Stato Mentale come il Variabile Moderante nella Gestione di Conflitti Organizzativi
., 2019.
Google Scholar
RTF
EndNote XML
Zareapoor, Masoumeh
,
Pourya Shamsolmoali
, and
Afshar M. Alam
.
"
Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction
." In
Digital Currency: Breakthroughs in Research and Practice
. IGI Global, 2019.
Google Scholar
RTF
EndNote XML
Richter, Heiko
, and
Peter R. Slowinski
.
"
The Data Sharing Economy: On the Emergence of New Intermediaries
."
International Review of Intellectual Property and Competition Law
50 (2019): 4-29.
DOI
Google Scholar
RTF
EndNote XML
Kim, Dohoon
.
"
Decision-Making Method for Estimating Malware Risk Index
."
Applied Sciences
9, no. 22 (2019): 4943.
DOI
Google Scholar
RTF
EndNote XML
Kveberg, Torbjørn
,
Vårin Alme
, and
Sverre Diesen
.
Defence against foreign influence -a value-based approach to define and assess harm, and to direct defence measures
In
FFI-RAPPORT
. Norwegian Defence Research Establishment (FFI) , 2019.
Google Scholar
RTF
EndNote XML
The Defence Innovation Greenhouse
., 2019.
Google Scholar
RTF
EndNote XML
Defending against today’s critical threats
In
2019 Threat Report
. Cisco, 2019.
Google Scholar
RTF
EndNote XML
Defense Intelligence and Security Service (MIDD)
., 2019.
Google Scholar
RTF
EndNote XML
McKenna, Matthew A.
.
Deficiencies in Electoral Security: Outcomes of the 2007 and 2013 Kenyan Elections
. Vol. Master's thesis. Harvard Extension School, 2019.
Google Scholar
RTF
EndNote XML
Berutti, Martin
.
Defining the digital twin: 7 essential steps
. ICE - Institution of Civil Engineers, 2019.
Google Scholar
RTF
EndNote XML
Nissen, Christopher A.
,
John E. Gronager
,
Robert S. Metzger
,
Rogers Joseph O’Donnell
, and
Harvey Rishikof
.
Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience
. Washington, DC: MITRE, 2019.
Google Scholar
RTF
EndNote XML
Lunn, Simon
, and
Nicholas Williams
.
The Demise of the INF Treaty: What Are the Consequences for NATO
In
Policy Brief, European Leadership Network
., 2019.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
65
66
67
68
69
70
71
72
73
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance