L3D40

(3.0)
L3T24 (50%): Information Age (11%), Cyberspace (8%), Telecommunications (8%), Computer networking (7%), Authentication (7%)
L2DCommonL1DSpecificExamples
L2D161

(1.4)
L3T24 (24%): Authentication (37%)

L3T2 (19%): Smartphone (45%), Mobile app (23%)

L3T33 (18%): Computing (16%), Vulnerability (computing) (13%), Internet of things (13%), Computer network (12%), Information technology (10%)
L1D435

(1.6)
L3T2 (24%): Near-field communication (7%), Smartphone (6%), Bluetooth (5%), Barcode (4%)

L3T24 (22%): Authentication (5%), Denial-of-service attack (4%), Malware (3%), Wi-Fi (3%), Information Age (3%)

L3T33 (15%): Computing (12%), Vulnerability (computing) (11%), Internet of things (9%), Cyberattack (9%), Computer network (9%)
  • Wearable computing : challenges and opportunities for privacy protection / report prepared by the Research Group of the Office of the Privacy Commissioner of Canada. (2002) (2002) [+]
  • FASTER-PrivBio project summary report / Kim Scott-Burrett, Michael Andre and David Bissessar. (2002) (2002) [+]
  • Real-time identification system using mobile hand-held devices : mobile biometrics evaluation framework / by Raj Nanavati. (2002) (2002) [+]
  • Usability evaluation of Desert Locust Military Goggle System with Recon MOD Live Heads-up Display : preliminary heuristic analysis results / Matthew Lamb, Justin G. Hollands. (2002) (2002) [+]
  • RFID TECHNOLOGY: WHAT THE FUTURE HOLDS FOR COMMERCE, SECURITY, AND THE CONSUMER (2004) (2004) [+]
  • RFID and Identity Management in Everyday Life - Striking the Balance between Convenience, Choice and Control (2007) (2007) [+]
  • Radio Frequency Identification (RFID) (2007) (2007) [+]
  • RFID Applications, Impacts and Country Initiatives (2008) (2008) [+]
  • Usability in Public Services and Border Control: New Technologies and Challenges for People with Disability (2009) (2009) [+]
  • RFID: Prospects for Europe: Item-level Tagging and Public Transportation (2010) (2010) [+]
  • Usability in public services and border control : new technologies and challenges for people with disability. (2011) (2011) [+]
  • RFID : prospects for Europe (item-level tagging and public transportation). (2011) (2011) [+]
  • Participatory Surveillance: report on evacuation exercise (2013) (2013) [+]
  • Wearable Sensors and Digital Platforms in Health: empowering citizens through trusted and trustworthy ICT technology. TRUDI Deliverable 3.1 (2014) (2014) [+]
  • Using Locational Data from Mobile Phones to Enhance the Science of Delivery (2014) (2014) [+]
  • Biometric Spoofing: A JRC Case Study in 3D Face Recognition (2014) (2014) [+]
  • Consumer empowerment in the fight against the counterfeiting of goods and Intellectual Property Rights infringement (2015) (2015) [+]
  • Participatory surveillance : report on evacuation exercise : SURCIT 2013, Deliverable 3.1 (2015) (2015) [+]
  • Biometric spoofing : a JRC case study in 3D face recognition. (2015) (2015) [+]
  • Wearable sensors and digital platforms in health : empowering citizens through trusted and trustworthy ICT technology: TRUDI Deliverable 3.1. (2015) (2015) [+]
  • Enforcers and brand owners’ empowerment in the fight against counterfeiting (2016) (2016) [+]
  • The Internet of Things and challenges for consumer protection (2016) (2016) [+]
  • Consumer empowerment in the fight against the counterfeiting of goods and Intellectual Property Rights infringement. (2016) (2016) [+]
  • Disrupter series : wearable devices : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, second session, March 3, 2016. (2016) (2016) [+]
  • Information on processing and access to geolocation data (2017) (2017) [+]
  • Enforcers and brand owners’ empowerment in the fight against counterfeiting. (2017) (2017) [+]
  • Wearable Technologies for Law Enforcement (2017) (2017) [+]
  • Smart Service Welt - Internetbasierte Dienste für die Wirtschaft (2017) (2017) [+]
  • City of Seattle (2018) (2018) [+]
  • Using Mobile Phones for Nutrition Surveillance: A Review of Evidence (2018) (2018) [+]
  • An overview of technologies for individual trip history collection : mobility decision science pillar SMART mobility consortium / (2019) (2019) [+]
L1D436

(1.6)
L3T2 (24%): Near-field communication (7%), Smartphone (6%), Bluetooth (5%), Barcode (4%)

L3T24 (22%): Authentication (5%), Denial-of-service attack (4%), Malware (3%), Wi-Fi (3%), Information Age (3%)

L3T33 (15%): Computing (12%), Vulnerability (computing) (11%), Internet of things (9%), Cyberattack (9%), Computer network (9%)
  • NIAC Hardening the Internet Final Report and Recommendations (2005) (2005) [+]
  • Identity in the Age of Cloud Computing: The next-generation Internet's impact on business, governance and social interaction - The Aspen Institute (2009) (2009) [+]
  • Measuring internet activity: a (selective) review of methods and metrics (2013) (2013) [+]
  • Seeking a Balance in U.S. Economic and National Security Interests (2015) (2015) [+]
  • Actionable information for security incident response. (2015) (2015) [+]
  • Personvern - tilstand og trender 2016 - Overvåkingsøkonomien (2016) (2016) [+]
  • Securing cyberspace : delivering concrete results through EU research and innovation. (2016) (2016) [+]
  • DPIAC Report 2016-01 Algortihmic Analytics and Privacy (2016) (2016) [+]
  • Big data security : good practices and recommendations on the security of big data systems. (2016) (2016) [+]
  • Schutz- und Sicherheitsanalyse im Rahmen der Entwicklung von Smart Grids in der Schweiz (2016) (2016) [+]
  • Critical Infrastructure and the Internet of Things (2017) (2017) [+]
  • A report to the President on enhancing the resilience of the internet and communications ecosystem against botnets and other automated, distributed threats / (2018) (2018) [+]
  • Transmitted by The Secretary of Commerce and The Secretary of Homeland Security (2018) (2018) [+]
  • Good practices for security of Internet of things in the context of smart manufacturing. (2018) (2018) [+]
  • Oversight of the National Telecommunications and Information Administration (2018) (2018) [+]
  • Transmitted by The Secretary of Commerce and The Secretary of Homeland Security (2018) (2018) [+]
  • Evaluation of regulatory tools for enforcing online gambling rules and channelling demand towards controlled offers. (2019) (2019) [+]
  • Proactive detection : good practices gap analysis recommendations. (2020) (2020) [+]
  • COMMISSION STAFF WORKING DOCUMENT: IMPACT ASSESSMENT REPORT Accompanying the document Proposal for a Directive of the European Parliament and of the Council on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148 (2020) (2020) [+]
  • Standards for Cybersecure IoT Devices: A Way Forward (2020) (2020) [+]
  • COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT REPORT Accompanying the document Proposal for a Directive of the European Parliament and of the Council on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 20 (2020) (2020) [+]
L1D437

(1.6)
L3T2 (24%): Near-field communication (7%), Smartphone (6%), Bluetooth (5%), Barcode (4%)

L3T24 (22%): Authentication (5%), Denial-of-service attack (4%), Malware (3%), Wi-Fi (3%), Information Age (3%)

L3T33 (15%): Computing (12%), Vulnerability (computing) (11%), Internet of things (9%), Cyberattack (9%), Computer network (9%)
  • Concepts for Enhancing Critical Infrastructure Protection: Relating Y2K to CIP Research and Development (2002) (2002) [+]
  • Cyber trust and crime prevention (2004) (2004) [+]
  • Guide to Supervisory Control and Data Acquisition (SCADA) and Other Industrial Control System Security (2006) (2006) [+]
  • Countering Terrorists' Use of Network Technologies (2007) (2007) [+]
  • Proceedings of the first JRC-Turkey workshop on ICT security. (2011) (2011) [+]
  • DGA communication and information systems : 2010 activity report. (2012) (2012) [+]
  • Informations- und Kommunikationstechnologien als Treiber für die Konvergenz Intelligenter Infrastrukturen und Netze - Analyse des FuE-Bedarfs (2014) (2014) [+]
  • Threat landscape and good practice guide for smart home and converged media. (2015) (2015) [+]
  • Etude Prospective et Stratégique (2015) (2015) [+]
  • Cyber security for smart cities : an architecture model for public transport. (2016) (2016) [+]
  • Cyber security and resilience of smart cars : good practices and recommendations. (2017) (2017) [+]
  • Annual Report (2018) (2018) [+]
  • CORDIS results pack on cybersecurity. (2018) (2018) [+]
  • Interagency report on status of international cybersecurity standardization for the internet of things (IoT) / (2018) (2018) [+]
  • Workforce development and curriculum guide : a role-based guide for hiring managers, education, and training providers.: D96-21/2020E-PDF Publications - Canada.ca (2020) (2020) [+]
  • A multi-dimensional framework to evaluate the innovation potential of digital public services : a step towards building an innovative public services observatory in the EU. (2020) (2020) [+]
  • The Role of Standards in Diffusion of Emerging Technologies Internet of Things (IoT) (2021) (2021) [+]
L2D162

(3.2)
L3T24 (91%): Secure communication (5%), Security technology (5%), Security engineering (5%), Crime prevention (4%), Cryptography (4%)
L1D438

(3.3)
L3T24 (90%): Secure communication (4%), Security technology (4%), Security engineering (4%), Espionage techniques (3%), Cryptography (3%)
  • Password guidance . (2002) (2002) [+]
  • User authentication guidance for information technology systems . (2002) (2002) [+]
  • Government of Canada guidance on using electronic signatures. (2002) (2002) [+]
  • ADVANCEMENTS IN SMART CARD AND BIOMETRIC TECHNOLOGY (2003) (2003) [+]
  • Data Protection: Safeguarding Privacy in a New Age of Technology (2005) (2005) [+]
  • RFID Security and Privacy White Paper - Attachment E to RFID Feasibility Study (2006) (2006) [+]
  • CC - Encryption Key Management (2007) (2007) [+]
  • General Approach To Authentication (2008) (2008) [+]
  • Information Security: Federal Agency Efforts to Encrypt Sensitive Information Are Under Way, but Work Remains (2008) (2008) [+]
  • Building Trust Networks (2009) (2009) [+]
  • Border Security: Better Usage of Electronic Passport Security Features Could Improve Fraud Detection (2010) (2010) [+]
  • Personal ID Verification: Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards (2011) (2011) [+]
  • Building trust networks. (2011) (2011) [+]
  • Electronic Soft-Identities (E-Ids) State-of-the-art and Multi-Morphed E-Ids, an Explorative Study (2013) (2013) [+]
  • Malicious Control System Cyber Security Attack Case Study: Maroochy Water Services, Australia (2013) (2013) [+]
  • Security of eGovernment Systems (2013) (2013) [+]
  • Security of eGovernment systems : case study report. (2013) (2013) [+]
  • Identity Protection and Access Management (IPAM) Glossary (2014) (2014) [+]
  • Specification for a Commonwealth Personal Identity Verification (PIV) Card (2014) (2014) [+]
  • Digital Signature Policy Guidelines (2014) (2014) [+]
  • Guidelines for derived personal identity verification (PIV) credentials / (2014) (2014) [+]
  • Identity Assurance Standard (2014) (2014) [+]
  • Evidence of Identity Standard (2014) (2014) [+]
  • Electronic Credential and Authentication Standard (2014) (2014) [+]
  • Authentication credentials for online government services (2014) (2014) [+]
  • OFA White Paper - The role of encryption in cloud computing for data privacy and security (2015) (2015) [+]
  • Electronic soft-Identities (e-id) : state-of-the-art and multi-morphed E-Ids, an explorative study. (2015) (2015) [+]
  • UK certificate policy and practice statement (2015) (2015) [+]
  • UK certificate policy and practice statement (2015) (2015) [+]
  • Trusted e-ID infrastructures and services in EU : TSP services, standards and risk analysis report. (2016) (2016) [+]
  • Auditing framework for TSPs : guidelines for trust service providers. (2016) (2016) [+]
  • Qualified website authentication certificates : promoting consumer trust in the website authentication market. (2016) (2016) [+]
  • Federation for a Secure Enterprise (2016) (2016) [+]
  • Security guidelines on the appropriate use of qualified website authentication certificates : guidance for users. (2017) (2017) [+]
  • An AFIS functionality for the European Criminal Records Information System : a preliminary assessment of DG JUST decentralised option supported by pseudonymised index-filter. (2017) (2017) [+]
  • COMMONWEALTH OF VIRGINIA (2017) (2017) [+]
  • HHS Information Security (2017) (2017) [+]
  • Assured Identity for Enterprise Level Security (2017) (2017) [+]
  • Data Mediation with Enterprise Level Security (2017) (2017) [+]
  • Article 19 incident reporting : incident reporting framework for eIDAS Article 19. (2017) (2017) [+]
  • Interoperable, State-approved Electronic Identities (2018) (2018) [+]
  • Proof of Concept Interoperabilität E-ID. Evaluation Report (2018) (2018) [+]
  • TAN Tech Brief (2018) (2018) [+]
  • Smart Tachograph - European Root Certificate Policy and Symmetric Key Infrastructure Policy (2018) (2018) [+]
  • Machine Readable Travel Documents (2018) (2018) [+]
  • A Password Free World (Web Authentication - WebAuthn) (2018) (2018) [+]
  • Pitch session template - Horizon 2020 security (2018) (2018) [+]
  • Smart Tachograph : European root certificate policy and symmetric key infrastructure policy. (2018) (2018) [+]
  • Proof of Concept Interoperabilität E-ID. Evaluation Report (2018) (2018) [+]
  • No middle ground: Moving on from the crypto wars (2018) (2018) [+]
  • CJIS Security Policy v5.8 (2019) (2019) [+]
  • Recommendations on shaping technology according to GDPR provisions : an overview on data pseudonymisation. (2019) (2019) [+]
  • Multifactor authentication for e-commerce / (2019) (2019) [+]
  • ANNEXC FACTSHEET (2019) (2019) [+]
  • A proposal for a European cybersecurity taxonomy. (2019) (2019) [+]
  • Task Force on Artificial Intelligence: The Future of Identity in Financial Services: Threats, Challenges, and Opportunities (2019) (2019) [+]
  • Passwordless Authentication: The next breakthrough in secure digital transformation (2020) (2020) [+]
  • Idaho Department of Finance Guidance Statement 2020-01-FIB (2020) (2020) [+]
  • Biometrics.: D97-1/00-019-2020E-PDF Publications - Canada.ca (2020) (2020) [+]
  • IoT security standards gap analysis : mapping of existing standards against requirements on security and privacy in the area of IoT. (2020) (2020) [+]
  • C190028 - UK Science, Research and Technology Capability and Influence in Global Disease Outbreaks (2020) (2020) [+]
  • Commission Implementing Decision (EU) 2021/1073 of 28 June 2021 laying down technical specifications and rules for the implementation of the trust framework for the EU Digital COVID Certificate established by Regulation (EU) 2021/953 of the European Parliament and of the Council (2021) (2021) [+]
L1D439

(3.3)
L3T24 (90%): Secure communication (4%), Security technology (4%), Security engineering (4%), Espionage techniques (3%), Cryptography (3%)
  • 23. Jahresbericht des Landesbeauftragten für den Datenschutz (2001) (2001) [+]
  • Design document for the technology demonstration of the Joint Network Defence and Management System (JNDMS) Project / by Scott MacDonald. (2002) (2002) [+]
  • Technology Assessment: Cybersecurity for Critical Infrastructure Protection (2004) (2004) [+]
  • Information Security: Technologies to Secure Federal Systems (2004) (2004) [+]
  • Ending the Cybersecurity Arms Race (2006) (2006) [+]
  • Nobody But Us (2006) (2006) [+]
  • Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk (2010) (2010) [+]
  • Information Security: Better Implementation of Controls for Mobile Devices Should Be Encouraged (2012) (2012) [+]
  • Prepared by : US Department of Homeland Security National Cyber Security Division Federal Network Security (2012) (2012) [+]
  • House Hearing, 112th Congress — CYBERSECURITY: THE PIVOTAL ROLE OF COMMUNICATIONS NETWORKS (2012) (2012) [+]
  • Mass Surveillance - Part 1: Risks and opportunities raised by the current generation of network services and applications (2015) (2015) [+]
  • Mass Surveillance - Part 1: Risks and opportunities raised by the current generation of network services and applications (2015) (2015) [+]
  • Mass surveillance : what are the risks for the citizens and the opportunities for the European information society? What are the possible mitigation strategies? Part 2, Technology foresight, options for longer-term security and privacy improvements. (2015) (2015) [+]
  • Mass surveillance : what are the risks for the citizens and the opportunities for the European information society? What are the possible mitigation strategies? Part 1, Risks, opportunities and mitigation strategies : annex. (2015) (2015) [+]
  • Mass surveillance : what are the risks for the citizens and the opportunities for the European information society? What are the possible mitigation strategies? Part 1, Risks, opportunities and mitigation strategies. (2015) (2015) [+]
  • Mass Surveillance - Part 2: Technology foresight, options for longer term security and privacy improvements (2015) (2015) [+]
  • Mass Surveillance - Part 2: Technology foresight, options for longer term security and privacy improvements (2015) (2015) [+]
  • State of North Carolina (2015) (2015) [+]
  • Mass surveillance : what are the risks for the citizens and the opportunities for the European information society? What are the possible mitigation strategies? Part 2, Technology foresight, options for longer-term security and privacy improvements : annex. (2015) (2015) [+]
  • Survey of malware threats and recommendations to improve cybersecurity for Industrial Control Systems version 1.0 / (2015) (2015) [+]
  • British Columbia Professional and Software Conformance Standards (2015) (2015) [+]
  • Mobile device security: a buyer's guide to choosing and using mobile devices (2016) (2016) [+]
  • Mobile device security: a buyer's guide to choosing and using mobile devices (2016) (2016) [+]
  • The United Republic Of Tanzania (2017) (2017) [+]
  • Level 2 8 1 eGovt Security Architecture stds tech guides final 2018 en (2017) (2017) [+]
  • The United Republic Of Tanzania (2017) (2017) [+]
  • Communication network dependencies for ICS/SCADA systems. (2017) (2017) [+]
  • Guide to Information Technology Security (2017) (2017) [+]
  • Mobile Device Security (2017) (2017) [+]
  • Cyber Security Trends and their implications in ICS er : mid-year report 2016 (2017) (2017) [+]
  • Securing IT Assets (2017) (2017) [+]
  • The latest and greatest (2017) (2017) [+]
  • 2016 CJIS Training Conference (2017) (2017) [+]
  • Park Compliant (2018) (2018) [+]
  • Election Infrastructure Security Funding Consideration (2018) (2018) [+]
  • Zhang et al. Indictment (2018) (2018) [+]
  • JUN - 8 2118 mty 18-1479 (2018) (2018) [+]
  • DWP procurement: security policies and standards (2018) (2018) [+]
  • National Study On Fr Ench Cyber Security (2018) (2018) [+]
  • Privacy Policy Del Sito (2018) (2018) [+]
  • Enterprise Threat Model Technical Report-Cyber Threat Model for a Notional Financial Services Sector Institution (2018) (2018) [+]
  • Securing wireless infusion pumps in healthcare delivery organizations / (2018) (2018) [+]
  • Likely Future Adoption of User-Controlled Encryption (2019) (2019) [+]
  • Understanding the Strategic and Technical Significance of Technology for Security The Case of Data Diodes for Cybersecurity (2019) (2019) [+]
  • Recommended Security Controls for Voter Registration Systems (2019) (2019) [+]
  • Eneikensileis (2019) (2019) [+]
  • Volume 2: Information Privacy & Security (2020) (2020) [+]
  • Document Approval & Review Information (2020) (2020) [+]
  • Wikimedia v. NSA - Joint Appendix Vol. 6-7 (2020) (2020) [+]
  • Cybercrime Prevention Principles for Internet Service Providers (2020) (2020) [+]
L1D440

(3.3)
L3T24 (90%): Secure communication (4%), Security technology (4%), Security engineering (4%), Espionage techniques (3%), Cryptography (3%)
  • Security Recommendations for TLS (1970) (1970) [+]
  • Format Oracles on OpenPGP (1970) (1970) [+]
  • The Myth of Superiority of American Encryption Products (1998) (1998) [+]
  • Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery (1998) (1998) [+]
  • Strong Cryptography: The Global Tide of Change (1999) (1999) [+]
  • On blockchain technology and its potential application in tactical networks / T.J. Willink. (2002) (2002) [+]
  • Data encryption,October 2006 (2006) (2006) [+]
  • CC - Cryptography for Stored Data (2007) (2007) [+]
  • CC - Secret Key Cryptography (2007) (2007) [+]
  • CC - Public Key Infrastructure (2007) (2007) [+]
  • CC - Hashing (2007) (2007) [+]
  • Cryptographic security mechanism of the next generation digital tachograph system (2012) (2012) [+]
  • Encryption 101 (2012) (2012) [+]
  • Cryptographic security mechanisms of the next generation digital tachograph system and future considerations. (2013) (2013) [+]
  • Manual STIC (2013) (2013) [+]
  • Protocol Independence Through Disjoint Encryption (2013) (2013) [+]
  • Secure Multidestination Delivery in DTN (2013) (2013) [+]
  • Authentication Tests (2013) (2013) [+]
  • Glosario y abreviaturas (2013) (2013) [+]
  • Cryptography for a High-Assurance Web-Based Enterprise (2013) (2013) [+]
  • Glosario y abreviaturas (2014) (2014) [+]
  • Study on cryptographic protocols. (2014) (2014) [+]
  • Algorithms, key size and parameters : report – 2014. (2014) (2014) [+]
  • The City of New York CITYWIDE INFORMATION SECURITY POLICY (2014) (2014) [+]
  • Smart metering equipment technical specifications: second version (2014) (2014) [+]
  • Distributed versus Centralized Protection Schema for the Enterprise (2014) (2014) [+]
  • Claims Technology Standard (2014) (2014) [+]
  • Conoce la SE / Marco Normativo / Diversas disposiciones (2015) (2015) [+]
  • Encryption and Law Enforcement Special Access: The U.S. Should Err on the Side of Stronger Encryption (2015) (2015) [+]
  • Formal Support for Standardizing Protocols with State (2015) (2015) [+]
  • Keys under doormats - mandating insecurity by requiring government access to all data and communications (2015) (2015) [+]
  • A security analysis of email communications (2015) (2015) [+]
  • Encryption Software Tools Market Survey Report (2015) (2015) [+]
  • Comments in the Matter of NIST Cryptographic Standards and Guidelines Development Process (2015) (2015) [+]
  • Bad Cryptography (2015) (2015) [+]
  • Cryptographic Standards For Information Protection (2015) (2015) [+]
  • Exploring the Boundaries of Big Data (2016) (2016) [+]
  • In der Kryptofalle (2016) (2016) [+]
  • Standardisation in the field of electronic identities and trust service providers : inventory of activities. (2016) (2016) [+]
  • Can This Code Be Trusted? Why Code Signing is Essential for IoT (2016) (2016) [+]
  • TAV-PTA 943.032.1 - Edition1 - i_bf (2016) (2016) [+]
  • Encryption: Frequently Asked Questions (2016) (2016) [+]
  • Simplified Key Management for Digital Access Control of Information Objects (2016) (2016) [+]
  • Gestione credenziali (2017) (2017) [+]
  • Smart tachograph : cryptographic keys and digital certificates sample set. (2017) (2017) [+]
  • Cyber Security Newsletter - September 2017 (2017) (2017) [+]
  • No, the laws of Australia don’t override the laws of mathematics (2017) (2017) [+]
  • Quantum Computing and its Impact on Cryptography (2017) (2017) [+]
  • A security analysis of email communications. (2017) (2017) [+]
  • Blockchain and Quantum Computing (2017) (2017) [+]
  • Smart Tachograph : user manual for the sample cryptographic keys and digital certificates generation tool. (2017) (2017) [+]
  • Protecting Large-scale IT systems developed and/or managed by eu-LISA from modern threats. (2017) (2017) [+]
  • Cryptographic Standards V1.7 (DRAFT 3) (2017) (2017) [+]
  • Smart Tachograph: Cryptographic keys and digital certificates sample set (2017) (2017) [+]
  • Machine Readable Travel Documents (2018) (2018) [+]
  • DWP procurement: security policies and standards (2018) (2018) [+]
  • DWP procurement: security policies and standards (2018) (2018) [+]
  • Beyond Bitcoin: Emerging Applications for Blockchain Technology (2018) (2018) [+]
  • Land Mobile Radio Encryption (2018) (2018) [+]
  • ITP-SEC031 – Encryption Standards for Data in Transit (2018) (2018) [+]
  • Letter of Intent: sub-committee 3 (2018) (2018) [+]
  • Pitch session template - Horizon 2020 security (2018) (2018) [+]
  • Blockchain Technology for Government (2018) (2018) [+]
  • The Executive’s Guide to Quantum Computing and Quantum-secure Cybersecurity - by Arthur Herman (2019) (2019) [+]
  • Quantum Technologies: Digital Transformation, Social Impact, and Cross-sector Disruption (2019) (2019) [+]
  • Tecnologías cuánticas: Una oportunidad transversal e interdisciplinar para la transformación digital y el impacto social (2019) (2019) [+]
  • New York State Information Technology Standard (2019) (2019) [+]
  • Options for Digital Birth Certificates (2019) (2019) [+]
  • Secure group communications for incident response and operational communities. (2019) (2019) [+]
  • Pseudonymisation techniques and best practices : recommendations on shaping technology according to data protection and privacy provisions. (2019) (2019) [+]
  • Implications of Quantum Computing for Encryption Policy (2019) (2019) [+]
  • Blockchain's Potential Starts With Security (2019) (2019) [+]
  • UAS service supplier framework for authentication and authorization : a federated approach to securing communications between service suppliers within the UAS Traffic Management system / (2019) (2019) [+]
  • New Perspectives on the Future of Encryption (2019) (2019) [+]
  • Breaking trust: Shades of crisis across an insecure software supply chain (2020) (2020) [+]
  • ITIF Technology Explainer: What Is Encryption? (2020) (2020) [+]
  • Is the Padlock on Your Browser Bar Giving You a False Sense of Security? (2020) (2020) [+]
  • Policy Brief: Encryption (2020) (2020) [+]
  • Guidance on securely configuring network protocols (version 2).: D97-3/40-062-2020E-PDF Publications - Canada.ca (2020) (2020) [+]
  • Using encryption to keep your sensitive data secure.: D97-1/40-016-2020E-PDF Publications - Canada.ca (2020) (2020) [+]
  • Enterprise Mission Tailored OAuth 2.0 and OpenID Connect Profiles (2020) (2020) [+]
  • Securing Communications in the Quantum Computing Age (2020) (2020) [+]
  • Guidance on cloud service cryptography.: D97-3/50-106-2020E-PDF Publications - Canada.ca (2020) (2020) [+]
  • EDPS TechDispatch : quantum computing and cryptography. Issue 2, 2020. (2020) (2020) [+]
  • Government of Canada considerations for the use of cryptography in commercial cloud services.: BT22-254/2020E-PDF Publications - Canada.ca (2020) (2020) [+]
  • Preparing your organization for the quantum threat to cryptography.: D97-1/00-017-2021E-PDF Publications - Canada.ca (2021) (2021) [+]
  • Quantum Computing and the Financial System: Spooky Action at a Distance? (2021) (2021) [+]
  • The Bitcoin Boom And The Quantum Threat - by Arthur Herman (2021) (2021) [+]
L2D163

(2.6)
L3T24 (49%): Computer networking (9%), Telecommunications (7%), Network architecture (6%)

L3T9 (46%): Computer architecture (8%), Data transmission (7%), Digital technology (6%), Computer engineering (5%), Communication protocol (5%)
L1D441

(2.8)
L3T24 (54%): Computer networking (4%), Network architecture (4%), Telecommunications (3%), Internet architecture (3%), Network protocols (2%)
  • Aspects of the Debate over the Secrecy of Communications (PDF: 722KB) (1970) (1970) [+]
  • Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers (1998) (1998) [+]
  • Incorporating commercial autopilots into DRDC's middleware for robotics (MIRO) / S. Monckton [and three others]. (2002) (2002) [+]
  • Mobile network field experiments, summer 2017 / Tricia Willink [and six others]. (2002) (2002) [+]
  • Network layer connectivity awareness with application to investigate the OSLR protocol in tactical MANETs / Ming Li, Mazda Salmanian, Tricia J. Willink. (2002) (2002) [+]
  • Technical and economic assessment of Internet protocol version 6 (IPv6). (2006) (2006) [+]
  • The Myth of Network Neutrality and What We Should Do About It (2006) (2006) [+]
  • The Myth of Network Neutrality and What We Should Do About It - AEI (2006) (2006) [+]
  • The Durable Internet: Preserving Network Neutrality without Regulation (2008) (2008) [+]
  • Workshop Report on Internet Governance Forum 2008 : a European Perspective (2009) (2009) [+]
  • Internet Governance (2010) (2010) [+]
  • Internet Governance (2010) (2010) [+]
  • EURid-UNESCO world report on internationalised domain names deployment 2012 (2012) (2012) [+]
  • Das Internetprotokoll Version 6 (IPv6) - Chancen und Herausforderungen für den Wirtschaftsstandort Deutschland (2012) (2012) [+]
  • Policy-Based Management of the Future Airborne Network via Peer-to-Peer Networking (2013) (2013) [+]
  • Authentication and Confidentiality via Ipsec (2013) (2013) [+]
  • Intrusion Detection for Air Force Networks: Environment Forecast (2013) (2013) [+]
  • Node State Multicasting in Wireless Ad Hoc Networks (2013) (2013) [+]
  • Filtering Postures: Local Enforcement for Global Policies (2013) (2013) [+]
  • Custodial Multicast in Delay Tolerant Networks (2013) (2013) [+]
  • Performance and Setup Guide for the NOS TCP/IP Protocol Used on HF Near-Vertical-Incidence-Skywave (NVIS) Radio Paths (2013) (2013) [+]
  • Internet Points of Control as Global Governance (2013) (2013) [+]
  • Layered Communications Architecture for the Global Grid* (2013) (2013) [+]
  • Secure naming and addressing operations for store, carry and forward networks / (2014) (2014) [+]
  • Microsoft Word - 5500011 (2014) (2014) [+]
  • Attack Possibilities by OSI Layer (2014) (2014) [+]
  • Allocation and use of IP addresses : report. (2014) (2014) [+]
  • Control and non-payload communications (CNPC) prototype radio : generation 2 security flight test report / (2015) (2015) [+]
  • Threat landscape and good practice guide for Internet infrastructure. (2015) (2015) [+]
  • A Framework for Understanding Internet Openness (2016) (2016) [+]
  • Internet Openness and Fragmentation: Toward Measuring the Economic Effects (2016) (2016) [+]
  • Maintaining High Assurance in Asynchronous Messaging (2016) (2016) [+]
  • Looking Back on the First Round of New gTLD Applications: Implications for Trademarks and Freedom of Expression (2016) (2016) [+]
  • A Universal Internet in a Bordered World: Research on Fragmentation, Openness and Interoperability (2016) (2016) [+]
  • The human side of cyber conflict : organizing, training, and equipping the Air Force cyber workforce / (2016) (2016) [+]
  • Security policy for a generic space exploration communication network architecture / (2016) (2016) [+]
  • Information Technology Telecommunications Network Services Contract (2016) (2016) [+]
  • Terms Of Reference Supply, Delivery, Installation And Configuration Of Server Load Balancer (2017) (2017) [+]
  • Using cognitive control in software-defined networking for port scan detection / (2017) (2017) [+]
  • Optical 3-way handshake (O3WHS) protocol simulation in OMNeT++ / (2017) (2017) [+]
  • ANNEX to the COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Making the most of NIS – towards the effective implementation of Directive (EU) 2016/1148 concerning measures for a high common level of security of network and info (2017) (2017) [+]
  • BYOD for Schools Pocket Guide: An Introduction to the Technologies and Terminologies (2017) (2017) [+]
  • BYOD for Schools: Technical Advice for School Leaders and IT Administrators (2017) (2017) [+]
  • You get what you measure: Internet performance measurement as a policy tool - AEI (2017) (2017) [+]
  • Guía de aseguramiento del Protocolo IPv6 (2017) (2017) [+]
  • Guide to Virtual Private Networks (VPN) via the Internet between GTS centres (2017) (2017) [+]
  • Mobile Ad Hoc for Enterprise Level Security (2018) (2018) [+]
  • Civil legal advice contract 2013 (2018) (2018) [+]
  • DWP procurement: security policies and standards (2018) (2018) [+]
  • WIKIMEDIA V. NSA - Exhibit 1 (2018) (2018) [+]
  • Criminal misuse of the Domain Name System (2018) (2018) [+]
  • WIKIMEDIA V. NSA -Declaration of Scott Bradner (2018) (2018) [+]
  • A Different Perspective on Big Data (2018) (2018) [+]
  • Four Internets: The Geopolitics of Digital Governance (2018) (2018) [+]
  • Response to public consultation on BEREC Guidelines on the implementation of the Open Internet Regulation (2019) (2019) [+]
  • Tanzania Computer Emergency Response Team (TZ-CERT) (2019) (2019) [+]
  • EU–US Relations on Internet Governance (2019) (2019) [+]
  • Guide to WIPO’s services for country code top-level domain registries (2019) (2019) [+]
  • REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL On the implementation, functioning and effectiveness of the .eu Top-Level Domain from April 2017 to April 2019 (2020) (2020) [+]
  • The politics of internet security: Private industry and the future of the web (2020) (2020) [+]
  • Legal analysis of the intermediary service providers of non-hosting nature : final report. (2020) (2020) [+]
  • Seguridad en Check Point (2020) (2020) [+]
  • Digital freedom: Building an Internet infrastructure that protects human rights (2021) (2021) [+]
  • Domain names : challenges and good practices from registrars and registries to prevent the misuse of domain names for IP infringement activities : discussion paper. (2021) (2021) [+]
L1D442

(2.8)
L3T24 (54%): Computer networking (4%), Network architecture (4%), Telecommunications (3%), Internet architecture (3%), Network protocols (2%)
  • Task report for task authorization 1 for: technology demonstration of the Joint Network Defence and Management System (JNDMS) Project . (2002) (2002) [+]
  • Automated Computer Network Defence Technology Demonstration Project Architectural Design Document for the Automated Computer Network Defence (ARMOUR) . (2002) (2002) [+]
  • Cyber Capability Development Centre (CCDC) Science & Technology (S&T) requirements, logical architecture & reference design / [by] Alan Magar. (2002) (2002) [+]
  • Cyber Capability Development Centre (CCDC) private cloud design / [by] Paul Worth. (2002) (2002) [+]
  • User's guide for the Joint Network Defence and Management System (JNDMS) / by Scott MacDonald. (2002) (2002) [+]
  • ITRM Standard EA225-01 - 2007 update (2007) (2007) [+]
  • Central Reservation System for DNR (2012) (2012) [+]
  • Compendium of Anomaly Detection and Reaction Tools and Projects (2013) (2013) [+]
  • Collaborative Operations in Joint Expeditionary Force Experiment (JEFX) 99 (2013) (2013) [+]
  • Intrusion Detection for Air Force Networks: Operational, Performance, and Implementation Goals (2013) (2013) [+]
  • CyberSecurity Monitoring Tools and Projects: A Compendium of Commercial and Government Tools and Government Research Projects (2013) (2013) [+]
  • Evaluations of Host-Based Intrusion Prevention Systems (HIPS): Sana's Primary Response and Cisco's Cisco Security Agent (2013) (2013) [+]
  • ININ_HCC RFP Solution and Pricing (2014) (2014) [+]
  • Chapter S (2014) (2014) [+]
  • NexxPhase_ HCC RFP Solution and Pricing (2014) (2014) [+]
  • Standards and tools for exchange and processing of actionable information. (2015) (2015) [+]
  • Implementation of the Virtual Data Embassy Solution (2015) (2015) [+]
  • FY18 (2016) (2016) [+]
  • Cloud service provider disclosure (2016) (2016) [+]
  • Ffirst ++. indd i 28 / 07 / 2015 6:12 PM (2016) (2016) [+]
  • Amendment No. 5 to Contract No. NS160000051 For TeamMate Software and Support between Wolters Kluwer Financial Services Inc. and the City of Austin (2016) (2016) [+]
  • State of Delaware Department of Technology & Information (2017) (2017) [+]
  • >' cl (2018) (2018) [+]
  • Governor Eric Holcomb Director and Chief Information Officer Dewand Neely (2018) (2018) [+]
  • Divisione V – Sistemi informativi, trasformazione digitale e formazione (2018) (2018) [+]
  • Cyber Threats’ Impact on Mission (CyTIM): Systems Integration Results (2018) (2018) [+]
  • Office Of Information Technology State Of Alabama (2019) (2019) [+]
  • NC DIT Delivers Effective, Affordable IT Solutions and Services to State Agencies (2019) (2019) [+]
  • PowerPoint Presentation (2019) (2019) [+]
  • Technical Specification (2019) (2019) [+]
  • Focus sull ’ infrastruttura (2019) (2019) [+]
  • Cyber Security Monitoring Centre (2019) (2019) [+]
  • Technical Specification (2019) (2019) [+]
  • Technical Specification (2019) (2019) [+]
  • FY20 Chargeback Rates (2019) (2019) [+]
  • NATO UNCLASSIFIED Releasable to EU (2020) (2020) [+]
L1D443

(2.8)
L3T24 (54%): Computer networking (4%), Network architecture (4%), Telecommunications (3%), Internet architecture (3%), Network protocols (2%)
  • A network access facility for CANUNET / D.A. Twyver, W. Dettwiler. (2002) (2002) [+]
  • Assessing the use of tactical clouds to enhance warfighter effectiveness / by Alan Magar. (2002) (2002) [+]
  • Methodology and guidelines for application protocol development / by D.A. MacKinnon. (2002) (2002) [+]
  • Valto: Information Security threats and solutions in mobile world (Luoti-ohjelma) (2005) (2005) [+]
  • Valto: Information Security threats and solutions in digital television (Luoti-ohjelma) (2005) (2005) [+]
  • Valto: Information Security in Wireless Networks (Luoti-ohjelma) (2006) (2006) [+]
  • Microsoft Word - State of Alaska Election Security Project supplemental document (2007) (2007) [+]
  • Layout 1 (2008) (2008) [+]
  • A Domain-Level Data Model for Automated Network Configuration (2013) (2013) [+]
  • An HLA-Based Approach to Quantify Achievable Performance for Tactical Edge Applications (2013) (2013) [+]
  • A Capabilities Description in Terms of the Network Monitoring and Assessment Module of CSAP21 (2013) (2013) [+]
  • Intrusion Detection System Requirements: A Capabilities Description in Terms of the Network Monitoring and Assessment Module of CSAP21 (2013) (2013) [+]
  • RES Listado Estimados AEESD 1 2015 (2015) (2015) [+]
  • RES Listado Estimados AEESD 1 2015 (2015) (2015) [+]
  • Threat landscape and good practice : guide for software defined networks/5G. (2016) (2016) [+]
  • Design of a reference architecture for an IoT sensor network (2019) (2019) [+]
  • Descubriendo los desafíos técnicos para la seguridad en las redes 5G (2020) (2020) [+]
  • ENISA threat landscape for 5G networks : threat assessment for the fifth generation of mobile telecommunications networks (5G). (2020) (2020) [+]
L2D164

(1.7)
L3T9 (45%): Digital technology (15%), Information technology management (13%), Information science (10%), Areas of computer science (9%)

L3T33 (23%): Information technology (31%), Computing (25%), Cloud computing (17%)
L1D444

(2.1)
L3T24 (41%): Security engineering (5%), Security technology (5%), Information Age (5%), Secure communication (4%), Cyberspace (4%)

L3T9 (32%): Digital technology (10%), Information technology management (9%), Areas of computer science (6%), Information science (6%)
  • An Open Source Based Data Warehouse Architecture to Support Decision Making in the Tourism Sector (2005) (2005) [+]
  • The Internet of Things (2008) (2008) [+]
  • E-Government Unit Ministry of Communication and Information Technology (2008) (2008) [+]
  • Enterprise Search in the European Union: A Techno-economic Analysis (2012) (2012) [+]
  • Microsoft PowerPoint - NC CJIN Board Mtg_15 Nov 2012_Final-1 (2012) (2012) [+]
  • Feasibility study for a pan-European storage system for information disclosed by issuers of securities. (2013) (2013) [+]
  • губернатор куомо (cuomo) объявляет о назначении специальных советников по открытым данным (2013) (2013) [+]
  • Enterprise search in the European Union : a techno-economic analysis. (2013) (2013) [+]
  • Enabling Data Analysis for Addressing Systemic Risk (2013) (2013) [+]
  • Briefing: VITA status update 2014 (2014) (2014) [+]
  • Big Data in der Cloud (2014) (2014) [+]
  • Strategic Communication (2014) (2014) [+]
  • Eight great technologies: Big data (2014) (2014) [+]
  • Platform28_HCC RFP Solution and Pricing (2014) (2014) [+]
  • Information Technology Policy Commonwealth of Pennsylvania Governor ' s Office of Administration / Office for Information Technology ITP Number : ITP-INF004 ITP Title : (2014) (2014) [+]
  • Guidelines for Managing Print Operations (2014) (2014) [+]
  • January 2015 Federal Cloud Computing Summit Summary (2015) (2015) [+]
  • GTA Board of Directors September 3, 2015 (2015) (2015) [+]
  • Oracle Technology Global Price List (2015) (2015) [+]
  • GAR-EZV Dokument D Umsetzungsplanung GAR (2016) (2016) [+]
  • Innovate UK funding competition winners 2015 (2016) (2016) [+]
  • Banca d'Italia - La tecnologia blockchain: nuove prospettive per i mercati finanziari (2016) (2016) [+]
  • Streamlining government services with bots (2016) (2016) [+]
  • Course Mapping Process (2017) (2017) [+]
  • Electronic Procurement Solution (2017) (2017) [+]
  • CATS+ Labor Rates - WSP Parsons Brinckerhoff Inc. (2017) (2017) [+]
  • 12 graphs: Eleven sectors of ‘data users’ (2017) (2017) [+]
  • Implementation analysis regarding the technical specifications and other key elements for a future EU system for traceability and security features in the field of tobacco products : final report. Annex II, Technical specifications of the tracking and tracing system and the security features. (2018) (2018) [+]
  • Kennzahlen und Indikatoren für die Beurteilung der Ressourceneffizienz von Rechenzentren und Prüfung der praktischen Anwendbarkeit (2018) (2018) [+]
  • Nutraceuticals & Functional Foods (2018) (2018) [+]
  • Global HR Design (2018) (2018) [+]
  • Presentazione standard Sogei (2018) (2018) [+]
  • Nutraceuticals & Functional Foods (2018) (2018) [+]
  • CAPPS Financials User Group Minutes 11292016 (2018) (2018) [+]
  • Mobile World Congress 2018 Www. Mwc-spain. Es (2018) (2018) [+]
  • 張仁炯 執行長 (2018) (2018) [+]
  • Rechtsfragen zur Digitalisierung (2018) (2018) [+]
  • CO18121 | Japan’s New Cybersecurity Strategy: Plugging the IoT Gap (2018) (2018) [+]
  • Medicaid Advisory Committee Meeting (2018) (2018) [+]
  • Data Integrated HSE Solutions (2018) (2018) [+]
  • Inclusion as a Positive Disruptor (2018) (2018) [+]
  • Employment Opportunities - Zonal Managers (2019) (2019) [+]
  • Employment Opportunities - Zonal Managers (2019) (2019) [+]
  • Servizi trasversali e di comunicazione (2019) (2019) [+]
  • S&T SCITI Labs: Datakwip (2019) (2019) [+]
  • Explore how the Oracle Digital Assistant opens doors to the broader use of #AI-powered #chatbots in #HR (2019) (2019) [+]
  • RFP19000698 Statewide Value-Add Resellers for Azure and AWS Attachment 7 (2019) (2019) [+]
  • DIR-TSO-3392 Appendix C Pricing Index (per Amendment 2).xlsx (2019) (2019) [+]
  • Big Oil, Big Data, Big Value (2019) (2019) [+]
  • D’activité (2019) (2019) [+]
  • Revision 1 – Project Requirements Revised To Read : (2019) (2019) [+]
  • Internet, Social Media und Big Data (2020) (2020) [+]
  • FMS0001 - NHS financial management and sustainability (2020) (2020) [+]
  • Edge computing (2020) (2020) [+]
  • Designing the Tech Function of the Future (2020) (2020) [+]
  • Data Archeogram: mapping the datafication of work (2021) (2021) [+]
  • Data Archeogram: mapping the datafication of work (2021) (2021) [+]
L1D445

(2.1)
L3T24 (41%): Security engineering (5%), Security technology (5%), Information Age (5%), Secure communication (4%), Cyberspace (4%)

L3T9 (32%): Digital technology (10%), Information technology management (9%), Areas of computer science (6%), Information science (6%)
  • The State and Local Election Cybersecurity Playbook (1998) (1998) [+]
  • Public safety grade mobile application management framework PSG-MAMF : a study of the public safety grade mobile application management and related security and policy concerns / Nesma Keshta, research associate, Dr. Yasser Morgan, associate professor and founder of BRIC initiative, University of Regina. (2002) (2002) [+]
  • SAMSON technology demonstrator architectural design document : phase IV SD002 / [by] Daniel Charlebois. (2002) (2002) [+]
  • Secure access management for a secure operational network : scientific paper / by Daniel Charlebois ... [et al.]. (2002) (2002) [+]
  • Is a bring your own device (BYOD) program the right choice for your organization? : privacy and security risks of a BYOD program. (2002) (2002) [+]
  • Privacy Impact Assessment for the Justice Management Division Intra-DOJ Information Exchange Architecture Infrastructure (IDEA-I) (2007) (2007) [+]
  • COMMONWEALTH OF VIRGINIA (2010) (2010) [+]
  • Standards (2011) (2011) [+]
  • Information Assurance for SOA (2013) (2013) [+]
  • House Hearing, 113th Congress — PROTECTING SMALL BUSINESSES AGAINST EMERGING AND COMPLEX CYBER-ATTACKS (2013) (2013) [+]
  • Information Security in the Clouds (2013) (2013) [+]
  • Information Technology Policy (2014) (2014) [+]
  • Directory Services Architecture (2014) (2014) [+]
  • A proposal for a taxonomy for vulnerabilities in supervisory control and data acquisition (SCADA) systems / (2014) (2014) [+]
  • Guide to application whitelisting / (2015) (2015) [+]
  • Presentation-Threat Assessment & Remediation Analysis (TARA) Methodology Overview (2015) (2015) [+]
  • Privacy Impact Assessment (2015) (2015) [+]
  • Thema-audit informatiebeveiliging. Globaal rapport (2015) (2015) [+]
  • Privacy and data protection by design - from policy to engineering. (2015) (2015) [+]
  • Security and resilience of smart home environments : good practices and recommendations. (2015) (2015) [+]
  • Companies Are Prioritizing Cybersecurity, but Hackers Still May Be Gaining (2015) (2015) [+]
  • построение системы информационной безопасности в программах складского учета (2016) (2016) [+]
  • P7430 Data Governance Technology Policy (2017) (2017) [+]
  • Cybersecurity in the Cloud (2017) (2017) [+]
  • COMMONWEALTH OF VIRGINIA (2017) (2017) [+]
  • Baseline security recommendations for IoT in the context of critical information infrastructures. (2017) (2017) [+]
  • Smartphone secure development guidelines. (2017) (2017) [+]
  • Research activities in enabling technologies for security and trustworthiness. (2018) (2018) [+]
  • DWP procurement: security policies and standards (2018) (2018) [+]
  • DWP procurement: security policies and standards (2018) (2018) [+]
  • DWP procurement: security policies and standards (2018) (2018) [+]
  • TTP—Transition to Practice Technology Guide (2018) (2018) [+]
  • Mapping of IoT security recommendations, guidance and standards (2018) (2018) [+]
  • The Cyber / Physical Security Framework (Draft) (2018) (2018) [+]
  • ExhibitA – Tribal Data Security Requirements (2018) (2018) [+]
  • 6019NF Indian Nation Prog Agmt (2018) (2018) [+]
  • Encryption and Going Dark – Cutting through the Gordian Knot (2018) (2018) [+]
  • Secure by Design (2018) (2018) [+]
  • GUIDE TO SECURING PERSONAL DATA IN ELECTRONIC MEDIUM (2018) (2018) [+]
  • Securely Using Software Assurance (SwA) Tools in the Software Development Environment (2018) (2018) [+]
  • Security for the Networked Enterprise, Elements ofa Holistic Approach (2018) (2018) [+]
  • Rethinking Intelligent Enterprise | Security Tech Vision (2018) (2018) [+]
  • The IoT Security Landscape (2019) (2019) [+]
  • Situational awareness for electric utilities / (2019) (2019) [+]
  • Infrastrutture critiche: la vulnerabilità del settore sanitario (2019) (2019) [+]
  • THE IoT SECURITY LANDSCAPE (2019) (2019) [+]
  • GUIDE TO DATA PROTECTION BY DESIGN FOR ICT SYSTEMS (2019) (2019) [+]
  • Reinforcing trust and security in the area of electronic communications and online services : sketching the notion of “state-of-the-art” for SMEs in security of personal data processing. (2019) (2019) [+]
  • Infrastrutture critiche: quando la sicurezza di uno stato è appesa a un filo (2019) (2019) [+]
  • Security requirements for E-Health Applications in the context of the ENS (2020) (2020) [+]
  • Zero Trust Architectures: Are We There Yet? (2021) (2021) [+]
  • Financial System Report Annex Series "Key Considerations for Risk Management in Using Cloud Services" (2021) (2021) [+]
L2D165

(1.6)
L3T13 (27%): Data center (15%), Provisioning (telecommunications) (13%), Interoperability (12%), Virtualization (8%)

L3T9 (24%): Digital technology (28%)
L1D446

(1.7)
L3T13 (26%): Software as a service (9%), Data center (8%), Platform as a service (7%), Provisioning (telecommunications) (6%), Interoperability (5%)

L3T9 (21%): Digital technology (7%)

L3T24 (15%): Voice over IP (4%), Telecommunications (3%), Wireless (3%), Project 25 (2%), UMTS (2%)
  • Information Technology Expenditures Report (2004) (2004) [+]
  • Microsoft Word - SoWA-QA Progress Report 3_Aug-Oct 15.doc (2004) (2004) [+]
  • Software & services FP7 project portfolio : internet of services, software and virtualisation : call 5. (2010) (2010) [+]
  • Corporate Foresight für Strategie und Innovation (2010) (2010) [+]
  • Cloud Computing (2012) (2012) [+]
  • Working Group Report on Cloud Computing Option for Small Size Urban Cooperative Banks (2012) (2012) [+]
  • Beyond Enterprise Resource Planning (ERP): The Next Generation Enterprise Resource Planning Environment (2012) (2012) [+]
  • Federal Cloud Computing: A Decision Process for Applying Cloud Computing in Federal Environments (2013) (2013) [+]
  • Cloud computing. (2013) (2013) [+]
  • Cloud Computing: A New Business Paradigm for Biomedical Information Sharing (2013) (2013) [+]
  • Cost Considerations in Cloud Computing (2014) (2014) [+]
  • Potential and Impacts of Cloud Computing Services and Social Network Websites (2014) (2014) [+]
  • Net-cloud future. (2014) (2014) [+]
  • Potential and impacts of cloud computing services and social network websites : study. (2014) (2014) [+]
  • A REPORT TO THE LEGISLATURE ON INFORMATION TECHNOLOGY EXPENDITURES (2015) (2015) [+]
  • Large Scale Computing Systems Study (2015) (2015) [+]
  • NICS Information Systems Strategy (2015) (2015) [+]
  • Expression Of Interest (eoi) For Recruitement Of E-procurement Application Manager Consultant (x3) (2016) (2016) [+]
  • Cloud computing: An overview of economic and policy issues (2016) (2016) [+]
  • OFA White Paper – Open Platforms: the future of Cloud Computing? (2016) (2016) [+]
  • Conference Schedule (2016) (2016) [+]
  • Justice Information Sharing Technology (JIST) (2016) (2016) [+]
  • Information Technology Strategy 2018–21 (2017) (2017) [+]
  • Statistical approaches to the measurement of skills — The state of play in Europe within the European Statistical System (2017) (2017) [+]
  • Incident notification for DSPs in the context of the NIS directive. (2017) (2017) [+]
  • Cloud computing : an overview of economic and policy issues : in-depth analysis. (2017) (2017) [+]
  • Switching of Cloud Services Providers : final report. (2018) (2018) [+]
  • Sultanate of Oman Information Technology Authority (2018) (2018) [+]
  • Division of Purchasing (2018) (2018) [+]
  • Office of the Chief Technology Officer FY2017 (2018) (2018) [+]
  • NYC Goods and Services Mentorship Program Graduates & Profiles (2018) (2018) [+]
  • DoD cloud strategy / (2018) (2018) [+]
  • Taking the Risk Out of Digital Projects (2018) (2018) [+]
  • Cloud computing strategic direction paper – opportunities and applicability for use by the Australian Government (2018) (2018) [+]
  • Progress report on the implementation of the Information Technology Strategy 2018‒21 (2018) (2018) [+]
  • Eight Key Dimensions of Platform Product Management (2018) (2018) [+]
  • Enterprise Architecture Technical Brief (2018) (2018) [+]
  • 年度我が国におけるデータ駆動型社会に係る基盤整備 (我が国のデータ産業を巡 る事業環境等に関する調査研究) (2018) (2018) [+]
  • City of Dallas .TECHNOLOGY Reference Architecture – HANDBOOK (2018) (2018) [+]
  • Transcript: Lessons Emerging from the JEDI Cloud: Immediate Steps and the Future of Next-Generation IT - by Hudson Institute (2019) (2019) [+]
  • Niagara Mohawk Power Corporation d / b / a National Grid (2019) (2019) [+]
  • Oportunidades tecnológicas y recomendaciones para la modernización de los sistemas integrados de administración financiera en América Latina y el Caribe (2019) (2019) [+]
  • Technological Opportunities and Recommendations for Modernizing Integrated Financial Management Information Systems in Latin America and the Caribbean (2019) (2019) [+]
  • Six Simple Steps Pave the Way to the Cloud (2019) (2019) [+]
  • Architecture Description: Common Capabilities to Support Northern Ireland Citizen Service Delivery (2019) (2019) [+]
  • Data Analytics for Advanced Metering Infrastructure : A Guidance Note for South Asian Power Utilities (2019) (2019) [+]
  • How Companies Win in OTT Video Services (2019) (2019) [+]
  • Capitolato Tecnico (2019) (2019) [+]
  • Outsourcing to the cloud : EIOPA’s contribution to the EU Commission fintech action plan. (2019) (2019) [+]
  • Digital technology in the not-for-profit sector: October 2020 (2020) (2020) [+]
  • Building Blocks of Change: The Benefits of Blockchain Technology for Small Businesses (2020) (2020) [+]
  • Information Technology Shared Services (2020) (2020) [+]
  • Dude, where's my cloud? A guide for wonks and users (2020) (2020) [+]
  • Four myths about the cloud: The geopolitics of cloud computing (2020) (2020) [+]
  • Cloud Computing (2020) (2020) [+]
  • Ensuring Digital Readiness in Financial Services (2020) (2020) [+]
  • Progress report on the implementation of the Information Technology Strategy 2018–21 (2021) (2021) [+]
L1D447

(1.7)
L3T13 (26%): Software as a service (9%), Data center (8%), Platform as a service (7%), Provisioning (telecommunications) (6%), Interoperability (5%)

L3T9 (21%): Digital technology (7%)

L3T24 (15%): Voice over IP (4%), Telecommunications (3%), Wireless (3%), Project 25 (2%), UMTS (2%)
  • A report on matters related to emergency 9-1-1 services / prepared for the Canadian Radio-television and Telecommunications Commission by Commissioner Timothy Denton, Inquiry Officer. (2002) (2002) [+]
  • Before The State Of New York Public Service Commission (2004) (2004) [+]
  • SeBoCom Pre-Study - A preliminary study on Secure Border Communications (2008) (2008) [+]
  • Report of the workshop on “Interoperable communications for Safety and Security”. (2010) (2010) [+]
  • Report of the workshop on "Interoperable communications for Safety and Security" with recommendations for Security research (2010) (2010) [+]
  • Obtaining and Admitting Electronic Evidence (2011) (2011) [+]
  • S.Hrg. 112-166 — SAFEGUARDING OUR FUTURE: BUILDING A NATIONWIDE NETWORK FOR FIRST RESPONDERS (2011) (2011) [+]
  • Optimising the use of the radio spectrum by the public sector in the European Union : final report. (2014) (2014) [+]
  • State of Arizona (2014) (2014) [+]
  • Support for the preparation of an impact assessment to accompany an EU initiative on reducing the costs of high‐speed broadband infrastructure deployment : final report. (2014) (2014) [+]
  • (b )( 6) (2014) (2014) [+]
  • State of Arizona (2014) (2014) [+]
  • Study on broadband and infrastructure mapping : final report. (2015) (2015) [+]
  • Public safety mobile broadband: draft report (2015) (2015) [+]
  • Availability and robustness of electronic communications infrastructures - "The ARECI Study" : final report. (2015) (2015) [+]
  • FS 012615 (2015) (2015) [+]
  • May 2015 – Revised (2015) (2015) [+]
  • Department of Communications annual report 2014-15 (2015) (2015) [+]
  • Internet protocol transition, FCC should strengthen its data collection efforts to assess the transition’s effects : report to congressional requesters. (2016) (2016) [+]
  • Public safety mobile broadband: research report (2016) (2016) [+]
  • Is industry meeting the information needs of people with disabilities on accessibility features of telephone equipment? (2016) (2016) [+]
  • For Development of Best Practices in Information (2016) (2016) [+]
  • For Development of Best Practices in Information (2016) (2016) [+]
  • Future Communications Technologies Could Strengthen Law Enforcement (2016) (2016) [+]
  • Please Note: (2017) (2017) [+]
  • A framework for monitoring the impact of 5G public private partnership and the associated key performance indicators (KPIs) : final report. (2017) (2017) [+]
  • STATE INTEROPERABLE & EMERGENCY COMMUNICATION BOARD MEETING MINUTES SEPTEMBER 27, 2017 DHSES - Building 7A - First Floor Training Room (2017) (2017) [+]
  • State of Illinois Next Generation 9-1-1 Feasibility Study (2017) (2017) [+]
  • Department of Defense Public Safety and Emergency Management Communications: Interoperability Data Requirements (2017) (2017) [+]
  • Open general export licence (information security items) (2018) (2018) [+]
  • Request For Proposal No. 2018-05 (2018) (2018) [+]
  • JYF 425 ITSP FY18-20 Summary (2018) (2018) [+]
  • STATE INTEROPERABLE & EMERGENCY COMMUNICATION BOARD MEETING MINUTES SEPTEMBER 12, 2018 DHSES - Building 7A - First Floor Training Room (2018) (2018) [+]
  • Fiscal Year 2019-20 Information Technology Request (2019) (2019) [+]
  • Study on the implementation of the open internet provisions of the Telecoms Single Market Regulation : final report. (2019) (2019) [+]
  • Draft general budget of the European Union for the financial year 2020 : working document. Part VI, Commission expenditure under the administrative heading of the multiannual financial framework. (2019) (2019) [+]
  • Department of the Army: Closing the Next Generation 9-1-1 Capability Gap (2019) (2019) [+]
  • SFG0023 - The Security of 5G (2020) (2020) [+]
L2D166

(2.0)
L3T9 (79%): Digital technology (8%), Computer file (7%), World Wide Web (6%), Computer data storage (6%), Operating system (5%)
L1D448

(2.2)
L3T9 (74%): Digital technology (2%), World Wide Web (2%), Information technology management (2%), Information science (2%), Computer file (2%)
  • A Guide to the implementation of the National Electronic Disease Surveillance System (NEDSS) in state public health (2001) (2001) [+]
  • Saskatchewan Police Predictive Analytics Lab missing persons project : year one / Kiera Stockdale. (2002) (2002) [+]
  • IMOSA project : functional requirements for managing information in office system / by Dale Ethier. (2002) (2002) [+]
  • User requirements for an executive information system : draft / presented by Jaimes, Cohen & Associates, Inc. (2002) (2002) [+]
  • I-STEPS DEVELOPMENT FOR STATE AND LOCAL AGENCIES (2003) (2003) [+]
  • Microsoft Word - Feasibility Study Final.doc (2004) (2004) [+]
  • Services State of Play - Compliance Testing and Interoperability Checking (2007) (2007) [+]
  • Data management plan - Southeast Alaska network / (2008) (2008) [+]
  • Computer Forensics (2008) (2008) [+]
  • HISO 10014.2:2010 Online Forms Architecture Technical Specification (2010) (2010) [+]
  • State Of Tennessee (2011) (2011) [+]
  • Prototype for Authentication of Official Electronic Record and Pricing- (2012) (2012) [+]
  • HL7 Version 2.5.1 Implementation Guide: Immunization Messaging (2012) (2012) [+]
  • HL7 Version 2.5.1 Implementation Guide: Immunization Messaging (2012) (2012) [+]
  • Legislative Council Data Processing Subcommittee (2012) (2012) [+]
  • Application of Service-Oriented Architecture to Distributed Simulation (2013) (2013) [+]
  • Platform as a Service: A 2010 Marketplace Analysis (2013) (2013) [+]
  • Principles of Interoperability and Integration, Volume 1: Fundamentals (2013) (2013) [+]
  • Getting Data to Applications: Why We Fail, How We Can Do Better (2013) (2013) [+]
  • Services state of play : compliance testing and interoperability checking. (2014) (2014) [+]
  • Developing a Trade Information Portal (2014) (2014) [+]
  • HL7 Version 2.5.1 implementation guide : immunization messaging (2014) (2014) [+]
  • Claims Information Standard (2014) (2014) [+]
  • HL7 Version 2.5.1 implementation guide : immunization messaging. Release 1.5 (2014) (2014) [+]
  • The ECIBC (European Commission Initiative on Breast Cancer) web hub concept and feasibility study (2015) (2015) [+]
  • Department of Veterans Affairs (2015) (2015) [+]
  • The ECIBC web hub concept and feasibility study. (2016) (2016) [+]
  • DES205: Electronic Data Interchange for imports (2016) (2016) [+]
  • Microsoft Word - 5500023 (2016) (2016) [+]
  • Integrated intelligent manufacturing for steel industries (I2MSteel) : final report. (2017) (2017) [+]
  • The United Republic Of Tanzania (2017) (2017) [+]
  • The United Republic Of Tanzania (2017) (2017) [+]
  • User Requirements for the Enterprise Data to Decisions Information Environment (2018) (2018) [+]
  • Commercial Off-the-Shelf (COTS) RFP Package - External or Internal Hosting (2018) (2018) [+]
  • Smoke screen in cyberspace architecture document / (2018) (2018) [+]
  • M00B9400203 - ImmuNet RFP (2018) (2018) [+]
  • DocuSign Envelope ID : 27891CD2-BBC8-4AA1-8950-E02A2FD12367 (2018) (2018) [+]
  • SHAREit ® (2018) (2018) [+]
  • Standard Bidding Documents (2018) (2018) [+]
  • File No. M-11011 / 1 / 2017-DSDD (2019) (2019) [+]
  • The AllFusion Erwin Data Modeler, AllFusion Data Model Validator, and Microsoft Vision can be used to produce the following de (2019) (2019) [+]
  • Dstl Forensic Publications (2020) (2020) [+]
  • Flight Object Sharing Capability Using Blockchain (2020) (2020) [+]
  • 00-IFB-CO-15079-AIS Cover Letter (2020) (2020) [+]
  • Sustainability of (open) data portal infrastructures : a distributed version control approach to creating Portals for Reuse. (2020) (2020) [+]
  • Efficiency and effectiveness in choosing and using an EMIS: guidelines for data management and functionality in Education management Information systems (EMIS) (2020) (2020) [+]
  • AHMCT report template (2020) (2020) [+]
  • Collections management system criteria checklist.: CH57-4/13-2020E-PDF Publications - Canada.ca (2020) (2020) [+]
  • Enterprise Architecture Standard (2020) (2020) [+]
  • Standard Bidding Documents (2020) (2020) [+]
  • Banca d'Italia - Real-Time Gross Settlement systems: breaking the wall of scalability and high availability (2021) (2021) [+]
L1D449

(2.2)
L3T9 (74%): Digital technology (2%), World Wide Web (2%), Information technology management (2%), Information science (2%), Computer file (2%)
  • Enterprise Document and Records Management System (2001) (2001) [+]
  • Security Technologies for Digital Media (2001) (2001) [+]
  • State Records Management Manual (2004) (2004) [+]
  • Microsoft Word - standards1.0.doc (2007) (2007) [+]
  • Electronic Records and Records Management Practices (2010) (2010) [+]
  • Minimum Technical Standards for Class II Gaming Systems and Equipment (2012) (2012) [+]
  • Test Results for Digital Data Acquisition Tool: MacQuisition 2013R2 (2014) (2014) [+]
  • Technical Report Documentation Page (2016) (2016) [+]
  • Tender Dossier (2017) (2017) [+]
  • Security technologies for digital media : final report. (2018) (2018) [+]
  • Security technologies for digital media : final report. (2018) (2018) [+]
  • INTERPOL Global Guidelines for Digital Forensics Laboratories (2019) (2019) [+]
  • Division of Revenue and Enterprise Services - New Jersey Records Manual (2020) (2020) [+]
  • Framework for Responding to a Drone Inci (2020) (2020) [+]
L1D450

(2.2)
L3T9 (74%): Digital technology (2%), World Wide Web (2%), Information technology management (2%), Information science (2%), Computer file (2%)
  • S.Hrg. 107-989 — FBI COMPUTERS: 1992 HARDWARE--2002 PROBLEMS (2002) (2002) [+]
  • Survey of commercial technologies for face recognition in video / by Dmitry O. Gorodnichy, Eric Granger, Paolo Radtke. (2002) (2002) [+]
  • Cost analysis of the entry-exit and registered traveller systems . Final report (2013) (2013) [+]
  • Internet as data source : feasibility study on statistical methods on internet as a source of data gathering. (2014) (2014) [+]
  • StateoftheArt Resources SOAR for Software Vulnerability Detection Test and Evaluation (2014) (2014) [+]
  • TSB-A-15(2)S:4/15:Petition No. S120425A,tsba152s (2015) (2015) [+]
  • Motor Vehicle Accident Prevention Course by Internet or Other Technologies (2015) (2015) [+]
  • Vetting the security of mobile applications / (2015) (2015) [+]
  • Contract Change Notice (2016) (2016) [+]
  • Mobile Security R&D Program Guide (2016) (2016) [+]
  • Can Smartphones and Privacy Coexist? (2016) (2016) [+]
  • Innovative working in the European parliament : a guide. (2016) (2016) [+]
  • State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation 2016 (2016) (2016) [+]
  • Core Infrastructure Initiative (CII) Best-Practices Badge Criteria (2016) (2016) [+]
  • Personal Information International Disclosure Protection Act (2017) (2017) [+]
  • Study on analysis, development and testing of the Unique Formula Identifier (UFI) for information to be submitted to Poison Centres, according to Article 45 (4) of EC Regulation No 1272/2008 (CLP Regulation) : final report. (2017) (2017) [+]
  • Customer Service Panel Update / Rebuttal – Electric & Gas (2018) (2018) [+]
  • Shared Biometric Matching Service (sBMS) : feasibility study - final report. (2018) (2018) [+]
  • Privacy and data protection in mobile applications : a study on the app development ecosystem and the technical implementation of GDPR. (2018) (2018) [+]
  • Disciplinare di gara cap. 22 pag. 51 e 61. Si prega di chiarire se la copia dei certificati Iso / IEC20000 e ISO / IEC27001 deve essere inserita nel documento di Offerta tecnica in apposita sezione o in documento separato. In quest ' ultimo caso si prega di indicare le modalità di presentazione e fascicolazione del documento. (2018) (2018) [+]
  • Copy area (2018) (2018) [+]
  • ECDB - European Crew Database D.3 Implementation options (2018) (2018) [+]
  • Personal Information International Disclosure Protection Act (2018) (2018) [+]
  • Feasibility study on a centralised routing mechanism for advance passenger information (and passenger name records) . Volume 1:main report. (2019) (2019) [+]
  • ECDB : European Crew Database : D.3 implementation options. (2019) (2019) [+]
  • Good practices for security of IoT : secure software development lifecycle. (2019) (2019) [+]
  • Activity report: CSV Monitoring and Evaluation Plan (2019) (2019) [+]
  • Security test Candidate Corona apps (2020) (2020) [+]
  • C190018 - UK Science, Research and Technology Capability and Influence in Global Disease Outbreaks (2020) (2020) [+]
  • Challenges and limits of an open source approach to Artificial Intelligence (2021) (2021) [+]
L2D167

(1.8)
L3T33 (28%): Cyberattack (18%), Vulnerability (computing) (14%), Cyberwarfare (12%), Computer network (10%), Computer security (9%)

L3T27 (22%): Systems engineering (10%), Architecture (8%), Risk management (8%), Defense Information Systems Agency (7%), SCADA (5%)

L3T24 (15%): Information Age (10%), Malware (8%)
L1D451

(1.8)
L3T33 (28%): Cyberattack (18%), Vulnerability (computing) (14%), Cyberwarfare (12%), Computer network (10%), Computer security (9%)

L3T27 (22%): Systems engineering (10%), Architecture (8%), Risk management (8%), Defense Information Systems Agency (7%), SCADA (5%)

L3T24 (15%): Information Age (10%), Malware (8%)
  • Information warfare simulation architecture development : task report / Evan Harris, Tab Lamoureux; prepared by CAE. (2002) (2002) [+]
  • Final report 11HL : technologies for trusted maritime situational awareness / by Anthony W. Isenor ... [et al.]. (2002) (2002) [+]
  • Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology (2004) (2004) [+]
  • Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology (2004) (2004) [+]
  • Understanding the Insider Threat: Proceedings of a March 2004 Workshop (2004) (2004) [+]
  • Job One for Space Force: Space Asset Cybersecurity (2006) (2006) [+]
  • ICT aspects of power systems and their security : final deliverable. (2011) (2011) [+]
  • IDA Research Notes - Challenges in Cyberspace Summer 2011 (2011) (2011) [+]
  • ICT aspects of power systems and their security (2011) (2011) [+]
  • On Cyberwarfare (2012) (2012) [+]
  • Engineering a Complex Information Enterprise: A Case Study Architecting the Department of Defense Hourglass (2013) (2013) [+]
  • Third Annual Secure and Resilient Cyber Architectures Workshop (2013) (2013) [+]
  • Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™) (2013) (2013) [+]
  • Cyber Resiliency Assessment: Enabling Architectural Improvement (2013) (2013) [+]
  • Resiliency Research Snapshot (2013) (2013) [+]
  • Cyber Resiliency Engineering Framework (2013) (2013) [+]
  • Glossary, Project Management (2014) (2014) [+]
  • S.Hrg. 113-465 — DEPARTMENT OF DEFENSE AUTHORIZATION OF APPROPRIATIONS FOR FISCAL YEAR 2015 AND THE FUTURE YEARS DEFENSE PROGRAM (2014) (2014) [+]
  • S.Hrg. 113-465 — DEPARTMENT OF DEFENSE AUTHORIZATION OF APPROPRIATIONS FOR FISCAL YEAR 2015 AND THE FUTURE YEARS DEFENSE PROGRAM (2014) (2014) [+]
  • Resiliency Techniques for Systems-of-Systems (2014) (2014) [+]
  • Ciclo de Inteligencia y análisis de intrusiones (2015) (2015) [+]
  • Securing DoD Networks for the 21st Century (2015) (2015) [+]
  • Cyber Resiliency Engineering Aid-The Updated Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency Techniques (2015) (2015) [+]
  • An Overview of MITRE Cyber Situational Awareness Solutions (2015) (2015) [+]
  • Securing DoD Networks for the 21st Century (2015) (2015) [+]
  • The Defence of Civilian Air Traffic Systems from Cyber Threats (2015) (2015) [+]
  • CO15214 | Singapore’s Smart City: Securing It From Emerging Cyber Threats (2015) (2015) [+]
  • House Hearing, 114th Congress — [H.A.S.C. No. 114-117] HEARING ON NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2017 AND OVERSIGHT OF PREVIOUSLY AUTHORIZED PROGRAMS BEFORE THE COMMITTEE ON ARMED SERVICES HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION (2016) (2016) [+]
  • Federal cybersecurity research and development strategic plan / (2016) (2016) [+]
  • Transforming digital continuity (2016) (2016) [+]
  • New York State (2016) (2016) [+]
  • Data to Decisions for Cyberspace Operations (2016) (2016) [+]
  • Підхід до забезпечення кібернетичної безпеки (engl.) (2016) (2016) [+]
  • Hearing on National Defense Authorization Act for Fiscal Year 2017 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Fourteenth Congress, second session : Subcommittee on Emerging Threats and Capabilities hearing on fiscal year 2017 information technology and cyber programs, foundations for a secure warfighting netwo (2017) (2017) [+]
  • Best Practices for Technical Standard Creation (2017) (2017) [+]
  • WHITE PAPER "Cyberbezpieczeństwo instalacji przemysłowych – fundament projektu „Industry 4.0” i szansa dla Polski" - ik.org.pl (2017) (2017) [+]
  • Issues with Access to Acquisition Data and Information in the Department of Defense (2017) (2017) [+]
  • Securing Critical Information Infrastructure: Global Perspectives and Practices (2017) (2017) [+]
  • Securing smart airports. (2017) (2017) [+]
  • Academic Centres of Excellence in Cyber Security Research (2017) (2017) [+]
  • Cyber Resiliency Design Principles (2017) (2017) [+]
  • A road map toward resilience against botnets. (2018) (2018) [+]
  • A report to the President on enhancing the resilience of the internet and communications ecosystem against botnets and other automated, distributed threats / (2018) (2018) [+]
  • Regulatory Article (RA) 1223: airworthiness information management (2018) (2018) [+]
  • System-of-Systems Threat Model (2018) (2018) [+]
  • Cyber Threat Modeling: Survey, Assessment, and Representative Framework (2018) (2018) [+]
  • Cyber Wargaming: Framework for Enhancing Cyber Wargaming with Realistic Business Context (2018) (2018) [+]
  • Supply Chain Attacks and Resiliency Mitigations (2018) (2018) [+]
  • Assessment of Operational Energy System Cybersecurity Vulnerabilities (2018) (2018) [+]
  • Good practices on interdependencies between OES and DSPs. (2018) (2018) [+]
  • Managing Information System Technology Changes across an Enterprise (2018) (2018) [+]
  • Cyber resilience for Industry X.0 in Europe (2018) (2018) [+]
  • State of Cyber Resilience Index 2018 (2018) (2018) [+]
  • DoD digital modernization strategy : DoD information resource management strategic plan FY 19-23. (2019) (2019) [+]
  • Hearing on National Defense Authorization Act for Fiscal Year 2020 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Sixteenth Congress, first session : Subcommittee on Intelligence and Emerging Threats and Capabilities hearing on Department of Defense information technology, cybersecurity, and information assurance (2019) (2019) [+]
  • Securing the Industrial Enterprise (2019) (2019) [+]
  • Operational Technology (2019) (2019) [+]
  • Digital Regulatory Reporting Pilot Phase 1 (2019) (2019) [+]
  • Enterprise Security Strategy | Rail and Transit (2019) (2019) [+]
  • Aerospace and Defense Cyber Resilience (2019) (2019) [+]
  • Banca d'Italia - N. 517 - Sviluppo di un sistema di cyber threat intelligence in una banca centrale (2019) (2019) [+]
  • Department of Defense Information Technology, Cybersecurity, and Information Assurance (2019) (2019) [+]
  • The Potential Human Cost of Cyber Operations (2019) (2019) [+]
  • S.Hrg. 116-265 — DEPARTMENT OF DEFENSE ENTERPRISE-WIDE CYBERSECURITY POLICIES AND ARCHITECTURE (2019) (2019) [+]
  • Development Of Structures Of Intellectual Information Protection System (2020) (2020) [+]
  • How do you fix a flying computer? Seeking resilience in software-intensive mission systems (2020) (2020) [+]
  • How to Analyze the Cyber Threat from Drones (2020) (2020) [+]
  • Managing for Mission Assurance in the Face of Advanced Cyber Threats (2021) (2021) [+]