Biblio

Export 21372 results:
2017
NESA. Public Private Partnerships (PPP) Cooperative models. European Union Agency for Network and Information Security, 2017.
ENISA. Public Private Partnerships (PPP) – Cooperative Models., 2017.
K.E., Eichensehr. "Public-Private Cybersecurity." Texas Law Review 95, no. 3 (2017): 467-538.
Sinclair, Harriet. Putin Bans VPNs in Crackdown on Anonymous Internet Use in Russia. Newsweek, 2017.
Schindler, John R.. Putin’s Balkan Terror Plot Exposed. Observer, 2017.
Security, IBM. QRadar Version 7.3.1 Administration Guide., 2017.
Security, IBM. QRadar Version 7.3.1 User guide., 2017.
Poryazov, Stoyan, Dmytro Progonov, and Emiliya Saranova. "Quality of Telecommunications as a Composition of Qualities of Subservices, Including Security and Trusted Third Parties." In 2017 25th Telecommunication Forum (TELFOR). Belgrade, Serbia, 2017.
Hemmings, John. Quasi-alliances, managing the rise of China, and domestic politics: the US-Japan-Australia trilateral 1991-2015. Vol. PhD thesis. The London School of Economics and Political Science (LSE), 2017.
Castro-Arvizu, Juan Manuel, Jordi Vilà-Valls, Ana Moragrega, Pau Closas, and Juan A. Fernandez-Rubio. "Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm." International Journal of Distributed Sensor Networks 13, no. 8 (2017).
Castro-Arvizu, Juan Manuel, Jordi Vila`-Valls, Ana Moragrega, Pau Closas, and Juan A. Fernandez-Rubio. "Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm." International Journal of Distributed Sensor Networks 13, no. 8 (2017).
Hidayah, Maulidia Rahmah, Isa Akhlis, and Endang Sugiharti. "Recognition Number of The Vehicle Plate Using Otsu Method and K-Nearest Neighbour Classification." Scientific Journal of Informatics 4, no. 1 (2017).
Couture, Jean-René. "Reconciling Operational and Financial Planning Views in a Customer-Funded Organization: Making Customer-Funding Work for NC3A." Information & Security: An International Journal 38 (2017): 63-69.
Kaplan, Jeffrey. "Red Dawn is Now: Race vs. Nation and the American Election." Terrorism and Political Violence 29, no. 3 (2017).
Siudak, Piotr. "Redefining cybersecurity through processual ontology of the cyberspace." Politeja 50, no. 14 (2017): 194-211.
Reform der Sicherheitsbehörden – Wie wär’s mit einem deutschen FBI?. Spiegel online, 2017.
Croissant, Aurel, and David Kuehn. Reforming Civil-Military Relations in New Democracies: Democratic Control and Military Effectiveness in Comparative Perspectives. Springer International Publishing AG , 2017.
Kocharyan, Hayk. Regional Security Dynamics: Azerbaijan In Analytical Bulletin: Center for Civilization and Cultural Studies., 2017.
On regulation of urban development activities In Law of Ukraine., 2017.
Mayer, Peter, Alexandra Kun, and Melanie Volkamer. Reliable Behavioural Factors in the Information Security Context In ACM International Conference Proceeding Series. Vol. Part F1305., 2017.
Oyekan, John, Vinayak Prabhu, Ashutosh Tiwari, Vinubha Baskaran, Mark Burgess, and Rob Mcnally. "Remote real-time collaboration through synchronous exchange of digitised human-workpiece interactions." Future Generation Computer Systems 67 (2017): 83-93.
Enev, E., Grigor Velev, Nikolai Stoianov, and Maya Bozhilova. Requirements for the Sensor Platform and Network for Indoor Deployment and Exterior Based Radiofrequency Awareness In ,” International Research Conference 105 Years Security and Defense Research. Sofia: Bulgarian Military Academy “G. S. Rakovski ”, 2017.
Edgar, Thomas W., and David O. Manz. Research Methods for Cyber Security . Cambridge: Elsevier, 2017.
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU. Brussels: European Commission, 2017.
Herrera, Hugo. "Resilience for Whom? The Problem Structuring Process of the Resilience Analysis." Sustainability 9, no. 7 (2017): 1196.

Pages