Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Information & knowledge management
»
Information management
Information management
Information management
Information management
3D Facial Reconstruction from 2D Portrait Imagery
Caruana, Matthew
, and
Joseph G. Vella
.
"
3D Facial Reconstruction from 2D Portrait Imagery
."
Information & Security: An International Journal
47, no. 3 (2020): 328-340.
4724_3d_facial_reconstruction.pdf
— Downloaded 3317 times
Read more
about 3D Facial Reconstruction from 2D Portrait Imagery
10362 reads
Google Scholar
DOI
RTF
EndNote XML
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
Mestric, Ivana Ilic
,
Arvid Kok
,
Giavid Valiyev
,
Michael Street
, and
Peter Lenk
.
"
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
."
Information & Security: An International Journal
46, no. 3 (2020): 227-238.
4616_sentiment_analysis.pdf
— Downloaded 3676 times
Read more
about Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
7578 reads
Google Scholar
DOI
RTF
EndNote XML
Model Fooling Attacks Against Medical Imaging: A Short Survey
Sipola, Tuomo
,
Samir Puuska
, and
Tero Kokkonen
.
"
Model Fooling Attacks Against Medical Imaging: A Short Survey
."
Information & Security: An International Journal
46, no. 2 (2020): 215-224.
4615_fooling_attacks_medical.pdf
— Downloaded 3221 times
Read more
about Model Fooling Attacks Against Medical Imaging: A Short Survey
11616 reads
Google Scholar
DOI
RTF
EndNote XML
Integration of Information Resources to Ensure Collaboration in Crisis Management
Ignatova, Kristina
, and
Dimitar Tsonev
.
"
Integration of Information Resources to Ensure Collaboration in Crisis Management
."
Information & Security: An International Journal
46, no. 2 (2020): 141-152.
4610_information_resources_collaboration.pdf
— Downloaded 3065 times
Read more
about Integration of Information Resources to Ensure Collaboration in Crisis Management
8261 reads
Google Scholar
DOI
RTF
EndNote XML
Signature-based Intrusion Detection Hardware-Software Complex
Stetsenko, Inna V.
, and
Maksym Demydenko
.
"
Signature-based Intrusion Detection Hardware-Software Complex
."
Information & Security: An International Journal
47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf
— Downloaded 4282 times
Read more
about Signature-based Intrusion Detection Hardware-Software Complex
8105 reads
Google Scholar
DOI
RTF
EndNote XML
Adopting Machine Learning for Images Transferred with LoRaWAN
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf
— Downloaded 3284 times
Read more
about Adopting Machine Learning for Images Transferred with LoRaWAN
7253 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 3586 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
11515 reads
Google Scholar
DOI
RTF
EndNote XML
A System for Analysis of Big Data from Social Media
Lande, Dmytro
,
Igor Subach
, and
Alexander Puchkov
.
"
A System for Analysis of Big Data from Social Media
."
Information & Security: An International Journal
47, no. 1 (2020): 44-61.
4703_big_data_social_media.pdf
— Downloaded 4489 times
Read more
about A System for Analysis of Big Data from Social Media
9363 reads
Google Scholar
DOI
RTF
EndNote XML
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
Shchoholiev, Maksym
, and
Violeta Tretynyk
.
"
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
."
Information & Security: An International Journal
43, no. 3 (2019): 375-382.
4328_tension_in_society_social_networks.pdf
— Downloaded 3595 times
Read more
about The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
10434 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Pöyhönen, Jouni
,
Viivi Nuojua
,
Martti Lehto
, and
Jyri Rajamäki
.
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
."
Information & Security: An International Journal
43, no. 2 (2019): 236-256.
4318_cyber_in_critical_infrastructure_organizations.pdf
— Downloaded 4243 times
Read more
about Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
12719 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
1
2
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Theoretical views
C4ISR
Information management
Knowledge management
Information security
Processes & Architectures
Simulation and Training
Change management
Decision-making
Good governance