Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Information Technology for Big Data Sensor Networks Stability Estimation
Petrivskyi, Volodymyr
,
Georgi Dimitrov
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Magdalena Garvanova
,
Galina Panayotova
, and
Pavel Petrov
.
"
Information Technology for Big Data Sensor Networks Stability Estimation
."
Information & Security: An International Journal
47, no. 1 (2020): 141-154.
4710_big_data_sensor_networks_stability_estimation.pdf
— Downloaded 3206 times
Read more
about Information Technology for Big Data Sensor Networks Stability Estimation
7171 reads
Google Scholar
DOI
RTF
EndNote XML
Tactical Approach to Cyber Defence in IoT Computer Networks
Staneva, Elisaveta
, and
Mariyan Rachev
.
"
Tactical Approach to Cyber Defence in IoT Computer Networks
."
Information & Security: An International Journal
47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf
— Downloaded 2872 times
Read more
about Tactical Approach to Cyber Defence in IoT Computer Networks
7057 reads
Google Scholar
DOI
RTF
EndNote XML
A Cost-Effective Approach to Securing Systems through Partial Decentralization
Savchenko, Nikita
,
Vitaliy Tsyganok
, and
Oleh Andriichuk
.
"
A Cost-Effective Approach to Securing Systems through Partial Decentralization
."
Information & Security: An International Journal
47, no. 1 (2020): 109-121.
4707_decentralization.pdf
— Downloaded 3256 times
Read more
about A Cost-Effective Approach to Securing Systems through Partial Decentralization
8609 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 3634 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
11606 reads
Google Scholar
DOI
RTF
EndNote XML
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Kharchenko, Vyacheslav
,
Sergiy Dotsenko
,
Yuriy Ponochovnyi
, and
Oleg Illiashenko
.
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
."
Information & Security: An International Journal
47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf
— Downloaded 3357 times
Read more
about Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
10744 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 3120 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
8078 reads
Google Scholar
DOI
RTF
EndNote XML
Analysis of Cybersecurity Issues in the Maritime Industry
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf
— Downloaded 5967 times
Read more
about Analysis of Cybersecurity Issues in the Maritime Industry
12352 reads
Google Scholar
DOI
RTF
EndNote XML
A Logical Model for Multi-Sector Cyber Risk Management
Tagarev, Todor
,
Salvatore Marco Pappalardo
, and
Nikolai Stoianov
.
"
A Logical Model for Multi-Sector Cyber Risk Management
."
Information & Security: An International Journal
47, no. 1 (2020): 13-26.
4701_risk_assessment_for_emaf.pdf
— Downloaded 4243 times
Read more
about A Logical Model for Multi-Sector Cyber Risk Management
15840 reads
Google Scholar
DOI
RTF
EndNote XML
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
Goel, Sanjay
.
"
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
."
Connections: The Quarterly Journal
19, no. 1 (2020): 87-95.
Introduction
19.1.08_goel_cyber_warfare_attribution.pdf
— Downloaded 3691 times
Read more
about How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
16032 reads
Google Scholar
DOI
RTF
EndNote XML
National Cyber Security Strategy and the Emergence of Strong Digital Borders
Goel, Sanjay
.
"
National Cyber Security Strategy and the Emergence of Strong Digital Borders
."
Connections: The Quarterly Journal
19, no. 1 (2020): 73-86.
Introduction
19.1.07_cybersecurity_digital_borders.pdf
— Downloaded 4540 times
Read more
about National Cyber Security Strategy and the Emergence of Strong Digital Borders
16909 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance