Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
Mengidis, Notis
,
Theodora Tsikrika
,
Stefanos Vrochidis
, and
Ioannis Kompatsiaris
.
"
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
."
Information & Security: An International Journal
43, no. 1 (2019): 21-33.
4302-blockchain_ai_energy_grids.pdf
— Downloaded 5223 times
Read more
about Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
14435 reads
Google Scholar
DOI
RTF
EndNote XML
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
Costigan, Sean
, and
Greg Gleason
.
"
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
."
Information & Security: An International Journal
43, no. 1 (2019): 13-20.
4301_blockchain_cryptocurrency.pdf
— Downloaded 4979 times
Read more
about What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
24373 reads
Google Scholar
DOI
RTF
EndNote XML
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
Tagarev, Todor
.
"
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
."
Information & Security: An International Journal
43, no. 1 (2019): 7-10.
4300_editorial.pdf
— Downloaded 5132 times
Read more
about DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
18096 reads
Google Scholar
DOI
RTF
EndNote XML
Amelioration of ElGamal Digital Signature Schemes
Ihia, Marouane
, and
Omar Khadir
.
"
Amelioration of ElGamal Digital Signature Schemes
."
Information & Security: An International Journal
42 (2019): 117-126.
4207_amelioration_of_elgamal.pdf
— Downloaded 1582 times
Read more
about Amelioration of ElGamal Digital Signature Schemes
9240 reads
Google Scholar
RTF
EndNote XML
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
Kopchev, Valeri
.
"
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
."
Information & Security: An International Journal
42 (2019): 67-81.
4204_cybersecurity_centres_vkopchev.pdf
— Downloaded 2072 times
Read more
about The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
4643 reads
Google Scholar
RTF
EndNote XML
Strategy, Partnerships and Human Capital for Cyber Resilience
Shalamanov, Velizar
.
"
Strategy, Partnerships and Human Capital for Cyber Resilience
."
Information & Security: An International Journal
42 (2019): 5-12.
Read more
about Strategy, Partnerships and Human Capital for Cyber Resilience
3179 reads
Google Scholar
RTF
EndNote XML
Russia’s Digital Awakening
Chim, William
.
"
Russia’s Digital Awakening
."
Connections: The Quarterly Journal
17, no. 2 (2018): 5-17.
17.2.01_chim_russia_digital_awakening.pdf
— Downloaded 3668 times
Read more
about Russia’s Digital Awakening
16571 reads
Google Scholar
DOI
RTF
EndNote XML
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
Mphago, Banyatsang
,
Dimane Mpoeleng
,
Shedden Masupe
, and
Oteng Tabona
.
"
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
."
Information & Security: An International Journal
40, no. 2 (2018): 189-202.
4014_self-advertising_honeypots.pdf
— Downloaded 3024 times
Read more
about Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
10395 reads
Google Scholar
DOI
RTF
EndNote XML
Information Sharing for Cyber Threats
Rizov, Vasil
.
"
Information Sharing for Cyber Threats
."
Information & Security: An International Journal
39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf
— Downloaded 5988 times
Read more
about Information Sharing for Cyber Threats
14477 reads
Google Scholar
DOI
RTF
EndNote XML
From Cryptology to Cyber Resilience – Bridging Theory and Practice
Sharkov, George
.
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
."
Information & Security: An International Journal
37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf
— Downloaded 606 times
Read more
about From Cryptology to Cyber Resilience – Bridging Theory and Practice
2854 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance