Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Information Technology for Big Data Sensor Networks Stability Estimation
Petrivskyi, Volodymyr
,
Georgi Dimitrov
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Magdalena Garvanova
,
Galina Panayotova
, and
Pavel Petrov
.
"
Information Technology for Big Data Sensor Networks Stability Estimation
."
Information & Security: An International Journal
47, no. 1 (2020): 141-154.
4710_big_data_sensor_networks_stability_estimation.pdf
— Downloaded 3549 times
Read more
about Information Technology for Big Data Sensor Networks Stability Estimation
7738 reads
Google Scholar
DOI
RTF
EndNote XML
Tactical Approach to Cyber Defence in IoT Computer Networks
Staneva, Elisaveta
, and
Mariyan Rachev
.
"
Tactical Approach to Cyber Defence in IoT Computer Networks
."
Information & Security: An International Journal
47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf
— Downloaded 3172 times
Read more
about Tactical Approach to Cyber Defence in IoT Computer Networks
7465 reads
Google Scholar
DOI
RTF
EndNote XML
A Cost-Effective Approach to Securing Systems through Partial Decentralization
Savchenko, Nikita
,
Vitaliy Tsyganok
, and
Oleh Andriichuk
.
"
A Cost-Effective Approach to Securing Systems through Partial Decentralization
."
Information & Security: An International Journal
47, no. 1 (2020): 109-121.
4707_decentralization.pdf
— Downloaded 3597 times
Read more
about A Cost-Effective Approach to Securing Systems through Partial Decentralization
9127 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 4014 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
12198 reads
Google Scholar
DOI
RTF
EndNote XML
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Kharchenko, Vyacheslav
,
Sergiy Dotsenko
,
Yuriy Ponochovnyi
, and
Oleg Illiashenko
.
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
."
Information & Security: An International Journal
47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf
— Downloaded 3692 times
Read more
about Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
11350 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 3487 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
8769 reads
Google Scholar
DOI
RTF
EndNote XML
Analysis of Cybersecurity Issues in the Maritime Industry
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf
— Downloaded 6466 times
Read more
about Analysis of Cybersecurity Issues in the Maritime Industry
12924 reads
Google Scholar
DOI
RTF
EndNote XML
A Logical Model for Multi-Sector Cyber Risk Management
Tagarev, Todor
,
Salvatore Marco Pappalardo
, and
Nikolai Stoianov
.
"
A Logical Model for Multi-Sector Cyber Risk Management
."
Information & Security: An International Journal
47, no. 1 (2020): 13-26.
4701_risk_assessment_for_emaf.pdf
— Downloaded 4633 times
Read more
about A Logical Model for Multi-Sector Cyber Risk Management
16537 reads
Google Scholar
DOI
RTF
EndNote XML
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
Goel, Sanjay
.
"
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
."
Connections: The Quarterly Journal
19, no. 1 (2020): 87-95.
Introduction
19.1.08_goel_cyber_warfare_attribution.pdf
— Downloaded 3949 times
Read more
about How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
16620 reads
Google Scholar
DOI
RTF
EndNote XML
National Cyber Security Strategy and the Emergence of Strong Digital Borders
Goel, Sanjay
.
"
National Cyber Security Strategy and the Emergence of Strong Digital Borders
."
Connections: The Quarterly Journal
19, no. 1 (2020): 73-86.
Introduction
19.1.07_cybersecurity_digital_borders.pdf
— Downloaded 4892 times
Read more
about National Cyber Security Strategy and the Emergence of Strong Digital Borders
17658 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance