Cybersecurity Library

Academic papers
Cyber-attacks of various purposes – for warfare or crimes, terrorism or political activism – commonly deploy the same types of cyber-weapons. Typically, (information about) a system vulnerability is embeddCybered into a software code called ‘exploit’...

Resource

The comic brings a worrying, yet realistic and educative story that follows a life of a cyber vulnerability, from its inception to its deployment for an actual cyberattack.

Source: 
Cybersecurity
 Vladimir Radunovic, Vladimir Veljasevic, 2018
 

Resource text

Printer Friendly and PDF
Briefs and Reports
The research, conducted by DiploFoundation and commissioned by the Swiss Federal Department of Foreign Affairs, identifies and reviews key trends and policy options for building competences in cybersecurity in ten OECD countries (Austria, Estonia, Fi...

Resource

Report on cybersecurity competence building trends in OECD countries

Source: 
Cybersecurity
 Vladimir Radunovic, David Rüfenacht, 2016
 

Resource text

Printer Friendly and PDF

Report on cybersecurity cooperation in the Western Balkans

Source: 
Cybersecurity
 Adriana Minovic, Adel Abusara, Eranda Begaj, Vladimir Erceg, Predrag Tasevski, Vladimir Radunovic, Franziska Klopfer, 2016
 

Resource text

Printer Friendly and PDF
Academic papers
In response to increasing cyber-armament, diplomatic initiatives have emerged attempting to codify state behaviour in cyberspace and encourage co-operation to reduce the risk of conflicts. The study Towards a secure cyberspace via regional co-oper...

Resource

The study Towards a secure cyberspace via regional co-operation provides an overview of the international dialogue on establishing norms of state behaviour and confidence-building measures in cyberspace.

Source: 
Cybersecurity
 Vladimir Radunovic, 2017
 

Resource text

Printer Friendly and PDF
Subscribe to Cybersecurity Library