Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Information Technology for Big Data Sensor Networks Stability Estimation
Petrivskyi, Volodymyr
,
Georgi Dimitrov
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Magdalena Garvanova
,
Galina Panayotova
, and
Pavel Petrov
.
"
Information Technology for Big Data Sensor Networks Stability Estimation
."
Information & Security: An International Journal
47, no. 1 (2020): 141-154.
4710_big_data_sensor_networks_stability_estimation.pdf
— Downloaded 2653 times
Read more
about Information Technology for Big Data Sensor Networks Stability Estimation
6033 reads
Google Scholar
DOI
RTF
EndNote XML
Tactical Approach to Cyber Defence in IoT Computer Networks
Staneva, Elisaveta
, and
Mariyan Rachev
.
"
Tactical Approach to Cyber Defence in IoT Computer Networks
."
Information & Security: An International Journal
47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf
— Downloaded 2372 times
Read more
about Tactical Approach to Cyber Defence in IoT Computer Networks
5980 reads
Google Scholar
DOI
RTF
EndNote XML
A Cost-Effective Approach to Securing Systems through Partial Decentralization
Savchenko, Nikita
,
Vitaliy Tsyganok
, and
Oleh Andriichuk
.
"
A Cost-Effective Approach to Securing Systems through Partial Decentralization
."
Information & Security: An International Journal
47, no. 1 (2020): 109-121.
4707_decentralization.pdf
— Downloaded 2715 times
Read more
about A Cost-Effective Approach to Securing Systems through Partial Decentralization
7285 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 2958 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
10150 reads
Google Scholar
DOI
RTF
EndNote XML
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Kharchenko, Vyacheslav
,
Sergiy Dotsenko
,
Yuriy Ponochovnyi
, and
Oleg Illiashenko
.
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
."
Information & Security: An International Journal
47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf
— Downloaded 2816 times
Read more
about Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
9018 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 2508 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
6667 reads
Google Scholar
DOI
RTF
EndNote XML
Analysis of Cybersecurity Issues in the Maritime Industry
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf
— Downloaded 4802 times
Read more
about Analysis of Cybersecurity Issues in the Maritime Industry
10353 reads
Google Scholar
DOI
RTF
EndNote XML
A Logical Model for Multi-Sector Cyber Risk Management
Tagarev, Todor
,
Salvatore Marco Pappalardo
, and
Nikolai Stoianov
.
"
A Logical Model for Multi-Sector Cyber Risk Management
."
Information & Security: An International Journal
47, no. 1 (2020): 13-26.
4701_risk_assessment_for_emaf.pdf
— Downloaded 3467 times
Read more
about A Logical Model for Multi-Sector Cyber Risk Management
14082 reads
Google Scholar
DOI
RTF
EndNote XML
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
Goel, Sanjay
.
"
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
."
Connections: The Quarterly Journal
19, no. 1 (2020): 87-95.
Introduction
19.1.08_goel_cyber_warfare_attribution.pdf
— Downloaded 2926 times
Read more
about How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13765 reads
Google Scholar
DOI
RTF
EndNote XML
National Cyber Security Strategy and the Emergence of Strong Digital Borders
Goel, Sanjay
.
"
National Cyber Security Strategy and the Emergence of Strong Digital Borders
."
Connections: The Quarterly Journal
19, no. 1 (2020): 73-86.
Introduction
19.1.07_cybersecurity_digital_borders.pdf
— Downloaded 3768 times
Read more
about National Cyber Security Strategy and the Emergence of Strong Digital Borders
14722 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance