Biblio

Export 17202 results:
2019
Game of Threats. How Cybercriminals Use Popular TV Shows to Spread Malware. Kaspersky Lab, 2019.
Pradeep, Siddhartha. Game theory, Strategies and the convoluted triangle - India, Pakistan, Kashmir,. Kiel, Hamburg: Leibniz Information Centre for Economics, 2019.
Vardeva, Ivelina. "Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security." Information & Security: An International Journal 43, no. 2 (2019).
Zoteva, Dafina, Peter Vassilev, Lyudmila Todorova, Krassimir Atanassov, Lyubka Doukovska, and Valery Tzanov. "Generalized Net Model of Cyber-control of the Firm’s Dumpers and Crushers." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Bozveliev, Boris, Sotir Sotirov, and Tihomir Videv. "Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019).
Fiebig, Tobias. "Governance Challenges for European Cybersecurity Policies: Stakeholders Views." In DIGILIENCE 2019., 2019.
Gramm-Leach-Bliley Act (GLBA) Resources., 2019.
Kovacheva, Ralitsa. "Hybrid Threats in Bulgarian Media." Information & Security: An International Journal 43, no. 3 (2019).
Iliev, Rosen, and Kristina Ignatova. "Implementation of Cloud Technologies for Building Data Centers in Defence and Security." Information & Security: An International Journal 43, no. 1 (2019).
MS, Hwang, Chou YC, Wu CC, and Yang CY. "An Improvement of Tseng–Wu Group Key Exchange Protocol." In Recent Developments in Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing. Vol. 752. Singapore: Springer, 2019.
Nelke, Margareta. Information Competence or Infotainment - where are we heading?., 2019.
InnoCenter Bulgaria., 2019.
Matta, Walter, and Alessandro Cantelli-Forti. "An innovative Airport Physical-cyber Security System (APSS)." Information & Security: An International Journal 43, no. 3 (2019).
Insider Threat Report In Out of sight should never be out of mind. Verizon, 2019.
Dotsenko, Sergiy, Oleg Illiashenko, Sergii Kamenskyi, and Vyacheslav Kharchenko. "Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045." Information & Security: An International Journal 43, no. 3 (2019).
Dotsenko, Sergiy, Oleg Illiashenko, Sergii Kamenskyi, and Vyacheslav Kharchenko. "Integrated Security Management System for Enterprises in Industry 4.0." Information & Security: An International Journal 43, no. 3 (2019).
Tagarev, Todor, Nikolai Stoianov, and George Sharkov. Integrative Approach to Understand Vulnerabilities and Enhance the Security of Cyber-Bio-Cognitive-Physical Systems In 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Vol. 2019-July. Coimbra, Portugal: European Conference on Information Warfare and Security, ECCWS, 2019.
IoT Standards and Protocols. Postscapes, 2019.
Kouhi-Esfahani, Marzieh. Iran's Foreign Policy in the South Caucasus: Relations with Azerbaijan and Armenia. Routledge, 2019.
ISO 27001 Official Page., 2019.
ISO/IEC 27000 Family - Information Security Management Systems. International Organization for Standardization (ISO), 2019.
ISO/IEC/IEEE 42010:2011 – Systems and Software Engineering – Architecture Description., 2019.
ISTR Internet Security Threat Report. Symantec, 2019.
Frühling, Stephan. "“Key to the defense of the free world”: The past, present and future relevance of NATO for US allies in the Asia–Pacific." Journal of Transatlantic Studies (2019): 1-17.
Langhof, Jan Gunter, and Stefan Güldenberg. "Leadership and the significance of formalized organizational structures: Crazy Horse vs Custer." Journal of Management History (2019).

Pages