Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Information & knowledge management
»
Information management
Information management
Information management
Information management
3D Facial Reconstruction from 2D Portrait Imagery
Caruana, Matthew
, and
Joseph G. Vella
.
"
3D Facial Reconstruction from 2D Portrait Imagery
."
Information & Security: An International Journal
47, no. 3 (2020): 328-340.
4724_3d_facial_reconstruction.pdf
— Downloaded 3032 times
Read more
about 3D Facial Reconstruction from 2D Portrait Imagery
9377 reads
Google Scholar
DOI
RTF
EndNote XML
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
Mestric, Ivana Ilic
,
Arvid Kok
,
Giavid Valiyev
,
Michael Street
, and
Peter Lenk
.
"
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
."
Information & Security: An International Journal
46, no. 3 (2020): 227-238.
4616_sentiment_analysis.pdf
— Downloaded 3291 times
Read more
about Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
6898 reads
Google Scholar
DOI
RTF
EndNote XML
Model Fooling Attacks Against Medical Imaging: A Short Survey
Sipola, Tuomo
,
Samir Puuska
, and
Tero Kokkonen
.
"
Model Fooling Attacks Against Medical Imaging: A Short Survey
."
Information & Security: An International Journal
46, no. 2 (2020): 215-224.
4615_fooling_attacks_medical.pdf
— Downloaded 2868 times
Read more
about Model Fooling Attacks Against Medical Imaging: A Short Survey
10458 reads
Google Scholar
DOI
RTF
EndNote XML
Integration of Information Resources to Ensure Collaboration in Crisis Management
Ignatova, Kristina
, and
Dimitar Tsonev
.
"
Integration of Information Resources to Ensure Collaboration in Crisis Management
."
Information & Security: An International Journal
46, no. 2 (2020): 141-152.
4610_information_resources_collaboration.pdf
— Downloaded 2725 times
Read more
about Integration of Information Resources to Ensure Collaboration in Crisis Management
7570 reads
Google Scholar
DOI
RTF
EndNote XML
Signature-based Intrusion Detection Hardware-Software Complex
Stetsenko, Inna V.
, and
Maksym Demydenko
.
"
Signature-based Intrusion Detection Hardware-Software Complex
."
Information & Security: An International Journal
47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf
— Downloaded 3891 times
Read more
about Signature-based Intrusion Detection Hardware-Software Complex
7327 reads
Google Scholar
DOI
RTF
EndNote XML
Adopting Machine Learning for Images Transferred with LoRaWAN
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf
— Downloaded 2957 times
Read more
about Adopting Machine Learning for Images Transferred with LoRaWAN
6451 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 3186 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
10695 reads
Google Scholar
DOI
RTF
EndNote XML
A System for Analysis of Big Data from Social Media
Lande, Dmytro
,
Igor Subach
, and
Alexander Puchkov
.
"
A System for Analysis of Big Data from Social Media
."
Information & Security: An International Journal
47, no. 1 (2020): 44-61.
4703_big_data_social_media.pdf
— Downloaded 3956 times
Read more
about A System for Analysis of Big Data from Social Media
8686 reads
Google Scholar
DOI
RTF
EndNote XML
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
Shchoholiev, Maksym
, and
Violeta Tretynyk
.
"
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
."
Information & Security: An International Journal
43, no. 3 (2019): 375-382.
4328_tension_in_society_social_networks.pdf
— Downloaded 3257 times
Read more
about The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
9668 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Pöyhönen, Jouni
,
Viivi Nuojua
,
Martti Lehto
, and
Jyri Rajamäki
.
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
."
Information & Security: An International Journal
43, no. 2 (2019): 236-256.
4318_cyber_in_critical_infrastructure_organizations.pdf
— Downloaded 3924 times
Read more
about Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
11810 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
1
2
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Theoretical views
C4ISR
Information management
Knowledge management
Information security
Processes & Architectures
Simulation and Training
Change management
Decision-making
Good governance