Biblio
Export 21424 results:
Criminal violence and state responses in the Northern Triangle. Monterey, California: Naval Postgraduate School, 2016.
Crisis Management Organization: Building Governance Capacity and Legitimacy." Public Administration Review 76, no. 6 (2016): 887-897.
"Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study In Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX. Brunow, Poland, 2016.
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." In IEEE 36th International Conference on Distributed Computing Systems., 2016.
"CSS Study: Learning from Disaster Events and Exercises in Civil protection Organizations In Risk and Resilience Reports. Zurich: Center for Security Studies, 2016.
Cyber Awareness, Strategies, and Practice." Information & Security: An International Journal 34, no. 1 (2016): 5-6.
"A cyber exercise post assessment framework: In Malaysia perspectives In School of Computing Science, College of Science and Engineering . Vol. Doctor of Philosophy. University of Glasgow, 2016.
Cyber Operations and Gray Zones: Challenges for NATO." Connections: The Quarterly Journal 15, no. 2 (2016): 109-119.
"Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations. MITRE Corporation, 2016.
Cyber Primer. Second Edition. Shrivenham, UK: Development, Concepts and Doctrine Centre, 2016.
Cyber Resilient Bulgaria 2020 In National Cybersecurity Strategy., 2016.
Cyber Security and the Politics of Time. Cambridge University Press, 2016.
Cyber Security Teaching and Learning Laboratories: A Survey." Information & Security: An International Journal 35, no. 1 (2016): 51-80.
"Cyber Terrain: A Model for Increased Understanding of Cyber Activity. Centre for Strategi Cyberspace + Security Science, 2016.
Cyber Threats Identification in the Evolving Digital Reality In National Conference on "Education and Research in the Information Society". Plovdiv, 2016.
Cyber-Attack Against Ukrainian Critical Infrastructure. Department of Homeland Security, 2016.
Cyberphysical Approach to the Study of the Functioning of Dynamic Systems." Elektrotehnicheskie i kompyuternyie sistemyi 22, no. 9 (2016): 354-358.
"Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
Cybersecurity Case for FPGA-Based NPP Instrumentation and Control Systems." In 24th International Conference on Nuclear Engineering ICONE24. Charlotte, North Carolina, 2016.
"Cybersecurity Critical for System Reliability. InTech – International Society of Automation, 2016.
Cybersecurity Culture as an Element of IT Professional Training. ResearchGate, 2016.
Cybersecurity in the Western Balkans: Policy gaps and cooperation opportunities. Geneva: DiploFoundation, 2016.
Cybersecurity Information Sharing Act In CISA S.2588 - 113th Congress, S.754 - 114th Congress., 2016.
The Cyber-Security State of our Nation: A Critique of South Africas Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure In ICCWS 2016 11th International Conference on Cyber Warfare and Security ., 2016.
Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64.
"