Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
»
Cyber threats
Cyber threats
Cyber threats
Cyber threats, scenarios, ...
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
Hryshchuk, Ruslan
, and
Katerina Molodetska-Hrynhchuk
.
"
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
."
Information & Security: An International Journal
41 (2018): 61-79.
4105_hryshchuk_molodetska.pdf
— Downloaded 1495 times
Read more
about Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
10483 reads
Google Scholar
DOI
RTF
EndNote XML
Information Sharing for Cyber Threats
Rizov, Vasil
.
"
Information Sharing for Cyber Threats
."
Information & Security: An International Journal
39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf
— Downloaded 4377 times
Read more
about Information Sharing for Cyber Threats
11538 reads
Google Scholar
DOI
RTF
EndNote XML
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
Baicheva, Tsonka
, and
Miroslav Dimitrov
.
"
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
."
Information & Security: An International Journal
37 (2017): 29-34.
3702_software_tool_asr.pdf
— Downloaded 129 times
Read more
about A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
8304 reads
Google Scholar
DOI
RTF
EndNote XML
From Cryptology to Cyber Resilience – Bridging Theory and Practice
Sharkov, George
.
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
."
Information & Security: An International Journal
37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf
— Downloaded 143 times
Read more
about From Cryptology to Cyber Resilience – Bridging Theory and Practice
683 reads
Google Scholar
DOI
RTF
EndNote XML
Hybrid War: High-tech, Information and Cyber Conflicts
Danyk, Yuriy
,
Tamara Maliarchuk
, and
Chad Briggs
.
"
Hybrid War: High-tech, Information and Cyber Conflicts
."
Connections: The Quarterly Journal
16, no. 2 (2017): 5-24.
Danyk, Hybrid war
— Downloaded 5927 times
Read more
about Hybrid War: High-tech, Information and Cyber Conflicts
48259 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
12373 reads
Google Scholar
RTF
EndNote XML
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
Perl, Raphael
, and
Nemanja Malisevic
.
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
." In
The Dangerous Landscape
, 47-61., 2013.
A Comprehensive Approach to Cyber Security
— Downloaded 3402 times
Read more
about A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
12165 reads
Google Scholar
RTF
EndNote XML
Cyberspace as the Environment Affected by Organized Crime Activity
Dela, Piotr
.
"
Cyberspace as the Environment Affected by Organized Crime Activity
."
Connections: The Quarterly Journal
15, no. 3 (2016): 55-64.
Cyberspace Affected by Organized Crime
— Downloaded 4644 times
Read more
about Cyberspace as the Environment Affected by Organized Crime Activity
17439 reads
Google Scholar
DOI
RTF
EndNote XML
The Use of the Internet by Terrorist Organizations
Rusumanov, Vase
.
"
The Use of the Internet by Terrorist Organizations
."
Information & Security: An International Journal
34, no. 2 (2016): 137-150.
3409_rusumanov_use_of_the_internet_by_terrorist_organizations.pdf
— Downloaded 3696 times
Read more
about The Use of the Internet by Terrorist Organizations
14145 reads
Google Scholar
DOI
RTF
EndNote XML
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Minchev, Zlatogor
.
"
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
."
Information & Security: An International Journal
34, no. 2 (2016): 123-136.
3405_minchev_id_ipts_in_social_networks.pdf
— Downloaded 1490 times
Read more
about Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
15897 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
next ›
last »
Search form
Search
Resources
Security policy
Cybersecurity
Policy and strategy
Organization
Cyber threats
Cyberwar & Cyberdefence
Standards & Technologies
Education & Training
Democratic oversight
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance