Biblio

Export 21404 results:
2019
Bergh, Arild. Massage the message: Modularising software for influence operation detection in social media., 2019.
Nikolić, Dejan Ž., Mitar Kovač, and Vlada M. Mitić. "Menadžment u odbrani - osnovne funkcije." Vojno delo 71, no. 1 (2019): 99-126.
Nikolic, Nebojsa. "Mesto Zapadnog Balkana u agendama Rusije i Turske u kontekstu hibridnih pretnji." Vojno delo 71, no. 7 (2019): 289-305.
Campedelli, Gian Maria. On Meta-Networks, Deep Learning, Time and Jihadism. Vol. Doctor of Philosophy in Criminology. Università Cattolica del Sacro Cuore di Milano, 2019.
Drozd, Oleksandr, Viktor Antoniuk, Svetlana Antoshchuk, and Myroslav Drozd. "A Method of Common Signal Monitoring in FPGA-Based Components of Safety-Related Systems." In CMIS, 2019., 2019.
Shalamanov, Velizar, and Georgi Penchev. "Methodology for Organizational Design of Cyber Research Networks." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Barybin, Oleksii. "Methodology of Testing for the Penetration of the Website of a Higher Education Institute." Standartyzatsiia, sertyfikatsiia, yakist. Systemy upravlinnia 4, no. 116 (2019): 12-18.
MGERB 10th Winter University Declaration: Destroying humanitarian aid is a crime against humanity. Focus-news.net, 2019.
Streif, Rudolf. Microcontroller versus System-on-Chip in Embedded System Designs. CTO - ibeeto, 2019.
Migration and Home Affairs. Information exchange, European Commission, 2019.
Militārās izlūkošanas un drošības dienests (MIDD)., 2019.
Russell, Matthew. Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram. O’Reilly Media, 2019.
O’Connor, Cailin, and James Owen Weatherall. The Misinformation Age: How False Beliefs Spread. New Haven, CT: Yale University Press, 2019.
Videv, Tihomir, Boris Bozveliev, and Sotir Sotirov. "Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation." Information & Security: An International Journal 43, no. 1 (2019): 45-53.
Gaydarski, Ivan, and Zlatogor Minchev. Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019.
Prav, Roman. "Monitoring of the development of information infrastructure in Ukraine." Technology audit and production reserves 3/4, no. 47 (2019): 12-18.
Dudykevych, Valeriy, Ivan Prokopyshyn, Vasyl Chekurin, Ivan Opirskyy, Yuriy Lakh, Taras Kret, Yevheniia Ivanchenko, and Ihor Ivanchenko. "A Multicriterial Analysis of the Efficiency of Conservative Information Security Systems." Eastern-European Journal of Enterprise Technologies 3, no. 9(99) (2019): 6-13.
Dieng, Moda. "The Multi-National Joint Task Force and the G5 Sahel Joint Force: The Limits of Military Capacity-Building Efforts." Contemporary Security Policy 40, no. 4 (2019): 481-501.
Deng, Yepeng, Chunkai Zhang, and Xuan Wang. A multi-objective examples generation approach to fool the deep neural networks in the black-box scenario In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)., 2019.
Kamp, Karl-Heinz. "Mythen der Zwei-Prozent-Debatte, Bundesakademie für Sicherheitspolitik." Arbeitspapier Sicherheitspolitik 9 (2019).
Gvadzabia, George. Nation State Cyber Propaganda Operations. Utica College, 2019.
National Emergency Supply Agency – Organisation., 2019.
Kimhi, Shaul, and Yarden Oliel. "National Resilience, Country Corruption and Quality of Life: An International Study." The International Journal of Social Sciences and Humanities Invention 6, no. 5 (2019): 5430-5436.
Freedom House. Nations in Transit 2018., 2019.
Davis, Susan. NATO in the Cyber Age: Strengthening Security & Defence, Stabilising Deterrence. NATO Parliamentary Assembly, 2019.

Pages