Cybersecurity
Trusting ICT Providers – Can Corporate Cyber Confidence-Building Measures Help?
Nations need to trust or ban a vendor from building their Information and Communication Technology (ICT) infrastructure and services. In a world where private companies almost exclusively wield both the technical expertise and means to develop, operate, and maintain the ICT structure, nations increasingly depend on the private sector.

Evolution of Police Roles in Combatting Cybercrime in the Czech Republic, 2015-2020
A significant milestone in the fight against cybercrime in the Czech Republic is the Government’s approval on July 10, 2017, of the “Concept for the Development of the Cybercrime Investigation Capabilities of the Police of the Czech Republic” (hereinafter the Concept) under number 502.

Sovereign or Global Internet? Russia and China Press for Cybercrime Treaty
Global unrest is fast becoming the norm in cyberspace, where cybercriminals operate with relative impunity, and novel technologies allow nation-states to sharpen their practice of influence operations. There is a near-constant rate of hacks against computers – by one recent count every 39 seconds on average for devices connected to the Internet.[1] If cybercrime is not tackled, at risk is nothing less than trust in the government’s ability to deliver on the promise of security.

Countering Crime, Hate Speech, and Disinformation in Cyberspace
Today, cyberspace is deeply challenged by a variety of largely political concerns. This new humanizing of cyberspace may seem fitting to some who fretted for years over a relative lack of high-level political interest in the world’s only new “domain.” With cyber now being the topic of the day, it is easy to forget that, however notional, cyber was considered too technical to be worthy of elite policy attention until suddenly it was red hot and everywhere.

A Clustering Method for Information Summarization and Modelling a Subject Domain

A Hybrid Intrusion Detection with Decision Tree for Feature Selection

The Concept of Resilience: Security Implications and Implementation Challenges
In recent years, the notion of resilience has experienced an astonishing expansion away from the area of its original application and transformation of its meaning.

Assessing the Maturity of National Cybersecurity and Resilience
Introduction
Modern digitized societies and economies are globally interconnected and increasingly interdependent as a result of global digital connectivity and dependency on digital infrastructure, communications, and systems. The analysis of these interdependencies and emerging complex vulnerabilities and threats requires a holistic approach, which goes well beyond the personal, the enterprise, or the sectoral cybersecurity measures.

Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report

TAS: Trust Assessment System
