Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
»
Cyber threats
Cyber threats
Cyber threats
Cyber threats, scenarios, ...
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Minchev, Zlatogor
.
"
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
."
Information & Security: An International Journal
34, no. 2 (2016): 123-136.
3405_minchev_id_ipts_in_social_networks.pdf
— Downloaded 2784 times
Read more
about Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
19275 reads
Google Scholar
DOI
RTF
EndNote XML
Assessing Cyber Security 2015
Rademaker, Michel
.
"
Assessing Cyber Security 2015
."
Information & Security: An International Journal
34, no. 2 (2016): 93-104.
3407_rademaker_assessing_cyber_security_2015.pdf
— Downloaded 3310 times
Read more
about Assessing Cyber Security 2015
11151 reads
Google Scholar
DOI
RTF
EndNote XML
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Rademaker, Michel
, and
Marc Gauw
.
"
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
."
Information & Security: An International Journal
32, no. 1 (2015): 65-70.
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
— Downloaded 6358 times
Read more
about Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
15608 reads
Google Scholar
DOI
RTF
EndNote XML
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Atalay, Ata
, and
Gurur Sanci
.
"
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
."
Information & Security: An International Journal
32, no. 1 (2015): 42-64.
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
— Downloaded 10367 times
Read more
about Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
20919 reads
Google Scholar
DOI
RTF
EndNote XML
Securing Cyberspace
Ivanova, Petya
.
"
Securing Cyberspace
."
Information & Security: An International Journal
18 (2006): 5-10.
1800_securing_cyberspace.pdf
— Downloaded 1365 times
Read more
about Securing Cyberspace
15081 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Policy and strategy
Organization
Cyber threats
Cyberwar & Cyberdefence
Standards & Technologies
Education & Training
Democratic oversight
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance