Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Information Technology for Big Data Sensor Networks Stability Estimation
Petrivskyi, Volodymyr
,
Georgi Dimitrov
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Magdalena Garvanova
,
Galina Panayotova
, and
Pavel Petrov
.
"
Information Technology for Big Data Sensor Networks Stability Estimation
."
Information & Security: An International Journal
47, no. 1 (2020): 141-154.
4710_big_data_sensor_networks_stability_estimation.pdf
— Downloaded 2961 times
Read more
about Information Technology for Big Data Sensor Networks Stability Estimation
6505 reads
Google Scholar
DOI
RTF
EndNote XML
Tactical Approach to Cyber Defence in IoT Computer Networks
Staneva, Elisaveta
, and
Mariyan Rachev
.
"
Tactical Approach to Cyber Defence in IoT Computer Networks
."
Information & Security: An International Journal
47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf
— Downloaded 2632 times
Read more
about Tactical Approach to Cyber Defence in IoT Computer Networks
6563 reads
Google Scholar
DOI
RTF
EndNote XML
A Cost-Effective Approach to Securing Systems through Partial Decentralization
Savchenko, Nikita
,
Vitaliy Tsyganok
, and
Oleh Andriichuk
.
"
A Cost-Effective Approach to Securing Systems through Partial Decentralization
."
Information & Security: An International Journal
47, no. 1 (2020): 109-121.
4707_decentralization.pdf
— Downloaded 3026 times
Read more
about A Cost-Effective Approach to Securing Systems through Partial Decentralization
7892 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 3296 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
10907 reads
Google Scholar
DOI
RTF
EndNote XML
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Kharchenko, Vyacheslav
,
Sergiy Dotsenko
,
Yuriy Ponochovnyi
, and
Oleg Illiashenko
.
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
."
Information & Security: An International Journal
47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf
— Downloaded 3100 times
Read more
about Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
9791 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 2856 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
7460 reads
Google Scholar
DOI
RTF
EndNote XML
Analysis of Cybersecurity Issues in the Maritime Industry
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf
— Downloaded 5382 times
Read more
about Analysis of Cybersecurity Issues in the Maritime Industry
11419 reads
Google Scholar
DOI
RTF
EndNote XML
A Logical Model for Multi-Sector Cyber Risk Management
Tagarev, Todor
,
Salvatore Marco Pappalardo
, and
Nikolai Stoianov
.
"
A Logical Model for Multi-Sector Cyber Risk Management
."
Information & Security: An International Journal
47, no. 1 (2020): 13-26.
4701_risk_assessment_for_emaf.pdf
— Downloaded 3921 times
Read more
about A Logical Model for Multi-Sector Cyber Risk Management
15081 reads
Google Scholar
DOI
RTF
EndNote XML
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
Goel, Sanjay
.
"
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
."
Connections: The Quarterly Journal
19, no. 1 (2020): 87-95.
Introduction
19.1.08_goel_cyber_warfare_attribution.pdf
— Downloaded 3403 times
Read more
about How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
15156 reads
Google Scholar
DOI
RTF
EndNote XML
National Cyber Security Strategy and the Emergence of Strong Digital Borders
Goel, Sanjay
.
"
National Cyber Security Strategy and the Emergence of Strong Digital Borders
."
Connections: The Quarterly Journal
19, no. 1 (2020): 73-86.
Introduction
19.1.07_cybersecurity_digital_borders.pdf
— Downloaded 4199 times
Read more
about National Cyber Security Strategy and the Emergence of Strong Digital Borders
15720 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance