Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
Mengidis, Notis
,
Theodora Tsikrika
,
Stefanos Vrochidis
, and
Ioannis Kompatsiaris
.
"
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
."
Information & Security: An International Journal
43, no. 1 (2019): 21-33.
4302-blockchain_ai_energy_grids.pdf
— Downloaded 5113 times
Read more
about Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
14248 reads
Google Scholar
DOI
RTF
EndNote XML
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
Costigan, Sean
, and
Greg Gleason
.
"
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
."
Information & Security: An International Journal
43, no. 1 (2019): 13-20.
4301_blockchain_cryptocurrency.pdf
— Downloaded 4895 times
Read more
about What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
24206 reads
Google Scholar
DOI
RTF
EndNote XML
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
Tagarev, Todor
.
"
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
."
Information & Security: An International Journal
43, no. 1 (2019): 7-10.
4300_editorial.pdf
— Downloaded 5038 times
Read more
about DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
17931 reads
Google Scholar
DOI
RTF
EndNote XML
Amelioration of ElGamal Digital Signature Schemes
Ihia, Marouane
, and
Omar Khadir
.
"
Amelioration of ElGamal Digital Signature Schemes
."
Information & Security: An International Journal
42 (2019): 117-126.
4207_amelioration_of_elgamal.pdf
— Downloaded 1532 times
Read more
about Amelioration of ElGamal Digital Signature Schemes
9107 reads
Google Scholar
RTF
EndNote XML
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
Kopchev, Valeri
.
"
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
."
Information & Security: An International Journal
42 (2019): 67-81.
4204_cybersecurity_centres_vkopchev.pdf
— Downloaded 2013 times
Read more
about The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
4532 reads
Google Scholar
RTF
EndNote XML
Strategy, Partnerships and Human Capital for Cyber Resilience
Shalamanov, Velizar
.
"
Strategy, Partnerships and Human Capital for Cyber Resilience
."
Information & Security: An International Journal
42 (2019): 5-12.
Read more
about Strategy, Partnerships and Human Capital for Cyber Resilience
3076 reads
Google Scholar
RTF
EndNote XML
Russia’s Digital Awakening
Chim, William
.
"
Russia’s Digital Awakening
."
Connections: The Quarterly Journal
17, no. 2 (2018): 5-17.
17.2.01_chim_russia_digital_awakening.pdf
— Downloaded 3609 times
Read more
about Russia’s Digital Awakening
16372 reads
Google Scholar
DOI
RTF
EndNote XML
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
Mphago, Banyatsang
,
Dimane Mpoeleng
,
Shedden Masupe
, and
Oteng Tabona
.
"
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
."
Information & Security: An International Journal
40, no. 2 (2018): 189-202.
4014_self-advertising_honeypots.pdf
— Downloaded 2959 times
Read more
about Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
10286 reads
Google Scholar
DOI
RTF
EndNote XML
Information Sharing for Cyber Threats
Rizov, Vasil
.
"
Information Sharing for Cyber Threats
."
Information & Security: An International Journal
39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf
— Downloaded 5877 times
Read more
about Information Sharing for Cyber Threats
14279 reads
Google Scholar
DOI
RTF
EndNote XML
From Cryptology to Cyber Resilience – Bridging Theory and Practice
Sharkov, George
.
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
."
Information & Security: An International Journal
37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf
— Downloaded 571 times
Read more
about From Cryptology to Cyber Resilience – Bridging Theory and Practice
2699 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance