Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
Mengidis, Notis
,
Theodora Tsikrika
,
Stefanos Vrochidis
, and
Ioannis Kompatsiaris
.
"
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
."
Information & Security: An International Journal
43, no. 1 (2019): 21-33.
4302-blockchain_ai_energy_grids.pdf
— Downloaded 5103 times
Read more
about Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
14222 reads
Google Scholar
DOI
RTF
EndNote XML
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
Costigan, Sean
, and
Greg Gleason
.
"
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
."
Information & Security: An International Journal
43, no. 1 (2019): 13-20.
4301_blockchain_cryptocurrency.pdf
— Downloaded 4890 times
Read more
about What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
24182 reads
Google Scholar
DOI
RTF
EndNote XML
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
Tagarev, Todor
.
"
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
."
Information & Security: An International Journal
43, no. 1 (2019): 7-10.
4300_editorial.pdf
— Downloaded 5032 times
Read more
about DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
17915 reads
Google Scholar
DOI
RTF
EndNote XML
Amelioration of ElGamal Digital Signature Schemes
Ihia, Marouane
, and
Omar Khadir
.
"
Amelioration of ElGamal Digital Signature Schemes
."
Information & Security: An International Journal
42 (2019): 117-126.
4207_amelioration_of_elgamal.pdf
— Downloaded 1528 times
Read more
about Amelioration of ElGamal Digital Signature Schemes
9105 reads
Google Scholar
RTF
EndNote XML
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
Kopchev, Valeri
.
"
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
."
Information & Security: An International Journal
42 (2019): 67-81.
4204_cybersecurity_centres_vkopchev.pdf
— Downloaded 2010 times
Read more
about The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
4512 reads
Google Scholar
RTF
EndNote XML
Strategy, Partnerships and Human Capital for Cyber Resilience
Shalamanov, Velizar
.
"
Strategy, Partnerships and Human Capital for Cyber Resilience
."
Information & Security: An International Journal
42 (2019): 5-12.
Read more
about Strategy, Partnerships and Human Capital for Cyber Resilience
3070 reads
Google Scholar
RTF
EndNote XML
Russia’s Digital Awakening
Chim, William
.
"
Russia’s Digital Awakening
."
Connections: The Quarterly Journal
17, no. 2 (2018): 5-17.
17.2.01_chim_russia_digital_awakening.pdf
— Downloaded 3605 times
Read more
about Russia’s Digital Awakening
16362 reads
Google Scholar
DOI
RTF
EndNote XML
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
Mphago, Banyatsang
,
Dimane Mpoeleng
,
Shedden Masupe
, and
Oteng Tabona
.
"
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
."
Information & Security: An International Journal
40, no. 2 (2018): 189-202.
4014_self-advertising_honeypots.pdf
— Downloaded 2957 times
Read more
about Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
10276 reads
Google Scholar
DOI
RTF
EndNote XML
Information Sharing for Cyber Threats
Rizov, Vasil
.
"
Information Sharing for Cyber Threats
."
Information & Security: An International Journal
39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf
— Downloaded 5866 times
Read more
about Information Sharing for Cyber Threats
14266 reads
Google Scholar
DOI
RTF
EndNote XML
From Cryptology to Cyber Resilience – Bridging Theory and Practice
Sharkov, George
.
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
."
Information & Security: An International Journal
37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf
— Downloaded 571 times
Read more
about From Cryptology to Cyber Resilience – Bridging Theory and Practice
2686 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance