Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2019
Fuentes, Gonzalo Álvarez
, and
Margarita Figueroa Sepúlveda
.
"
América Latina y el desafío de la planificación basada en capacidades. Aportes preliminares desde la experiencia de Chile
."
Revista Relaciones Internacionales, Estrategia y Seguridad
14, no. 1 (2019).
Google Scholar
RTF
EndNote XML
Hidayat, Abdiyan Syaiful
.
"
Analisis Strategi Pengendalian Laut di Alur Laut Kepulauan Indonesia (ALKI) II Menggunakan Metode Structural Equation Modeling (SEM)
."
Jurnal Ketahanan Nasional
25, no. 3 (2019).
DOI
Google Scholar
RTF
EndNote XML
Bontchev, Vesselin
, and
Veneta Yosifova
.
"
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
."
Information & Security: An International Journal
43, no. 2 (2019): 264-282.
DOI
Google Scholar
RTF
EndNote XML
Hyra, Bartlomiej
.
Analyzing the Attack Surface of Ships
In
DTU Compute Department of Applied Mathematics and Computer Science
. Kongens Lyngby: Technical University of Denmark, 2019.
Google Scholar
RTF
EndNote XML
Annual Report on the Status of Defense and the Armed Forces
. Sofia: Council of Ministers, 2019.
Google Scholar
RTF
EndNote XML
Annual Report on the Status of Defense and the Armed Forces
., 2019.
Google Scholar
RTF
EndNote XML
Annual Report on the Status of Defense and the Armed Forces
., 2019.
Google Scholar
RTF
EndNote XML
Annual Report on the Status of Defense and the Armed Forces
., 2019.
Google Scholar
RTF
EndNote XML
Annual Report on the Status of Defense and the Armed Forces
., 2019.
Google Scholar
RTF
EndNote XML
Martino, Steve
.
Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
In
Cisco Benchmark Report
., 2019.
Google Scholar
RTF
EndNote XML
Syam, Rajarshi
, and
R. Marapareddy
.
Application of deep neural networks in the field of information security and healthcare
In
2019 SoutheastCon,
., 2019.
Google Scholar
RTF
EndNote XML
Blagoev, Ivan
.
Application of Time Series Techniques for Random Number Generator Analysis
In
XXII Int. Conference DCCN
. Moscow, Russia, 2019.
Google Scholar
RTF
EndNote XML
Dodonov, Oleksandr
,
Dmytro Lande
,
O. Nesterenko
, and
Boris Berezin
.
Approach to forecasting the effectiveness of public administration using OSINT technologies: Information technology and security
In
Proceedings of the XIX International Scientific and Practical Conference ITS-2019
. Kyiv: Engineering: , 2019.
Google Scholar
RTF
EndNote XML
Lafaye, Caroline Guibet
.
Armes et principes. Éthique de l’engagement politique armé
., 2019.
Google Scholar
RTF
EndNote XML
Wirtz, Bernd W.
,
Jan C. Weyerer
, and
Carolin Geyer
.
"
Artificial Intelligence and the Public Sector—Applications and Challenges
."
International Journal of Public Administration
42, no. 7 (2019).
Google Scholar
RTF
EndNote XML
Svilicic, Boris
,
Junzo Kamahara
,
Jasmin Celic
, and
Johan Bolmsten
.
"
Assessing Ship Cyber Risks: A Framework and Case Study of ECDIS Security
."
WMU Journal of Maritime Affairs
18, no. 3 (2019): 509-520.
DOI
Google Scholar
RTF
EndNote XML
Athanasios, Dagoumas
.
"
Assessing the Impact of Cybersecurity Attacks on Power Systems
."
Energies
12 (2019).
Google Scholar
RTF
EndNote XML
Аль-Хафаджі, Ахмед Валід
,
Олександр Олекс Соловйов
,
Дмитро Дмитр Узун
, and
Вячеслав Сергі Харченко
.
"
Asset Access Risk Analysis Method in the Physical Protection Systems
."
Radioelectronic and computer systems
4 (2019).
Google Scholar
RTF
EndNote XML
Bontcheva, Kalina
.
"
Assistive AI Tools for Analysing False Content, Disinformation Flows, and Online Influence Campaigns
." In
DIGILIENCE 2019
. Sofia, Bulgaria, 2019.
Google Scholar
RTF
EndNote XML
Farrugia, Neil
, and
Joseph Vella
.
"
Automating Footwear Impressions Retrieval through Texture
."
Information & Security: An International Journal
43, no. 1 (2019): 73-86.
DOI
Google Scholar
RTF
EndNote XML
Gu, Tianyu
,
Kang Liu
,
Brendan Dolan-Gavitt
, and
Siddharth Garg
.
"
Badnets: Evaluating backdooring attacks on deep neural networks
."
IEEE Access
7 (2019): 47230-47244.
Google Scholar
RTF
EndNote XML
Devlin, Jacob
,
Ming-Wei Chang
,
Kenton Lee
, and
Kristina Toutanova
.
BERT: Pretraining of Deep Bidirectional Transformers for Language Understanding
In
NAACL-HLT 2019
. Minneapolis, Minnesota, 2019.
Google Scholar
RTF
EndNote XML
Ghanizadeh, Afsaneh
, and
Safoura Jahedizadeh
.
"
“The Best of the Intellect Is a Person’s Knowledge of His Own Self”: Exploring the Psychological Aspects of Imam Reza’s Hadith Using Structural Equation Modeling
."
Arena of Regulation
(2019): 1-18.
Google Scholar
RTF
EndNote XML
The Best Practices in Data Center Design & Installation
. Colocation America, 2019.
Google Scholar
RTF
EndNote XML
Mengidis, Notis
,
Theodora Tsikrika
,
Stefanos Vrochidis
, and
Ioannis Kompatsiaris
.
"
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
."
Information & Security: An International Journal
43, no. 1 (2019): 21-33.
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
61
62
63
64
65
66
67
68
69
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance