Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Information & knowledge management
»
Information management
Information management
Information management
Information management
3D Facial Reconstruction from 2D Portrait Imagery
Caruana, Matthew
, and
Joseph G. Vella
.
"
3D Facial Reconstruction from 2D Portrait Imagery
."
Information & Security: An International Journal
47, no. 3 (2020): 328-340.
4724_3d_facial_reconstruction.pdf
— Downloaded 3130 times
Read more
about 3D Facial Reconstruction from 2D Portrait Imagery
9697 reads
Google Scholar
DOI
RTF
EndNote XML
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
Mestric, Ivana Ilic
,
Arvid Kok
,
Giavid Valiyev
,
Michael Street
, and
Peter Lenk
.
"
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
."
Information & Security: An International Journal
46, no. 3 (2020): 227-238.
4616_sentiment_analysis.pdf
— Downloaded 3425 times
Read more
about Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
7125 reads
Google Scholar
DOI
RTF
EndNote XML
Model Fooling Attacks Against Medical Imaging: A Short Survey
Sipola, Tuomo
,
Samir Puuska
, and
Tero Kokkonen
.
"
Model Fooling Attacks Against Medical Imaging: A Short Survey
."
Information & Security: An International Journal
46, no. 2 (2020): 215-224.
4615_fooling_attacks_medical.pdf
— Downloaded 2964 times
Read more
about Model Fooling Attacks Against Medical Imaging: A Short Survey
10759 reads
Google Scholar
DOI
RTF
EndNote XML
Integration of Information Resources to Ensure Collaboration in Crisis Management
Ignatova, Kristina
, and
Dimitar Tsonev
.
"
Integration of Information Resources to Ensure Collaboration in Crisis Management
."
Information & Security: An International Journal
46, no. 2 (2020): 141-152.
4610_information_resources_collaboration.pdf
— Downloaded 2838 times
Read more
about Integration of Information Resources to Ensure Collaboration in Crisis Management
7757 reads
Google Scholar
DOI
RTF
EndNote XML
Signature-based Intrusion Detection Hardware-Software Complex
Stetsenko, Inna V.
, and
Maksym Demydenko
.
"
Signature-based Intrusion Detection Hardware-Software Complex
."
Information & Security: An International Journal
47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf
— Downloaded 3994 times
Read more
about Signature-based Intrusion Detection Hardware-Software Complex
7534 reads
Google Scholar
DOI
RTF
EndNote XML
Adopting Machine Learning for Images Transferred with LoRaWAN
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf
— Downloaded 3037 times
Read more
about Adopting Machine Learning for Images Transferred with LoRaWAN
6663 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 3298 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
10909 reads
Google Scholar
DOI
RTF
EndNote XML
A System for Analysis of Big Data from Social Media
Lande, Dmytro
,
Igor Subach
, and
Alexander Puchkov
.
"
A System for Analysis of Big Data from Social Media
."
Information & Security: An International Journal
47, no. 1 (2020): 44-61.
4703_big_data_social_media.pdf
— Downloaded 4133 times
Read more
about A System for Analysis of Big Data from Social Media
8868 reads
Google Scholar
DOI
RTF
EndNote XML
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
Shchoholiev, Maksym
, and
Violeta Tretynyk
.
"
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
."
Information & Security: An International Journal
43, no. 3 (2019): 375-382.
4328_tension_in_society_social_networks.pdf
— Downloaded 3362 times
Read more
about The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
9885 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Pöyhönen, Jouni
,
Viivi Nuojua
,
Martti Lehto
, and
Jyri Rajamäki
.
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
."
Information & Security: An International Journal
43, no. 2 (2019): 236-256.
4318_cyber_in_critical_infrastructure_organizations.pdf
— Downloaded 4030 times
Read more
about Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
12100 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
1
2
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Theoretical views
C4ISR
Information management
Knowledge management
Information security
Processes & Architectures
Simulation and Training
Change management
Decision-making
Good governance