Biblio

Export 21373 results:
2020
RPi HardwareHistory. RPi Hub, 2020.
Peck, Michael. "Russia’s best strategy for controlling the Black Sea? Divide and conquer." Forbes (2020).
Newman, Lily Hay. Russia’s FireEye Hack Is a Statement—but Not a Catastrophe. Wired, 2020.
Trenin, Dmitri. Russia’s Viral Calculations. Diwan – Middle East Insights from Carnegie, 2020.
Russia 'Used Bulgarian Airspace' To Deliver Military Equipment To Serbia. RFE/RL's Bulgarian, 2020.
Dzebisashvili, Shalva, Suzana Kalashiani, Irakli Gabriadze, Rezo Beradze, and Mirian Ejibia. "Russian Economic Footprint and the Impact on Democratic Institutions in Georgia." Connections: The Quarterly Journal 19, no. 4 (2020): 39-58.
Yildirim, Zafer. "Russia's Role in the Unification Process of Ukraine to EU: Hinderance or Cause?" In Handbook of Research on Social and Economic Development in the European Union, 435-454., 2020.
Nereim, Vivian. Saudi Arabia Looks at ‘Painful Measures,’ Deep Spending Cuts. Bloomberg, 2020.
Duand, Miao, and Kun Wang. "An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things." IEEE Transactions on Industrial Informatics 16, no. 1 (2020): 648-657.
SecureHospitals., 2020.
Antonov, Petar, and Nikoleta Georgieva. "Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
Gupta, Maanak, Mahmoud Abdelsalam, Sajad Khorsandroo, and Sudip Mittal. "Security and Privacy in Smart Farming: Challenges and Opportunities." IEEE Access 8 (2020): 1-21.
Romero, Lyndell D.. Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study. Colorado Technical University, 2020.
Security education, training, and certification for DoD and Industry., 2020.
von Münchow, Sebastian. "The Security Impacts of the COVID-19 Pandemic." Connections: The Quarterly Journal 19, no. 2 (2020): 5-9.
SEE 2020, Final Event Video., 2020.
SEE Web site., 2020.
Sentry Tools., 2020.
Service of Financial Accounting, Accountability, Monitoring and Audit In Useful Information., 2020.
Alapuranen, N.. "SHAPES privacy and data protection." In D8.4 – SHAPES Ethical Framework, 48-59. Brussels: European Commission, 2020.
Stetsenko, Inna V., and Maksym Demydenko. "Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
Booth, L, K Fleming, J Abad, L.A Schueller, M Leone, A Scolobig, and A Baills. "Simulating Synergies between Climate Change Adaptation and Disaster Risk Reduction Stakeholders to Improve Management of Transboundary Disasters in Europe." International Journal of Disaster Risk Reduction 49, no. 101668 (2020).
Meyers, Adam. Situational Awareness: Cyber Threats Heightened by COVID-19 and How to Protect Against Them., 2020.
SNORT., 2020.
Bada, Maria, and Jason R. C. Nurse. "The Social and Psychological Impact of Cyber-Attacks." In Emerging Cyber Threats and Cognitive Vulnerabilities, 73-92. London: Academic Press, 2020.

Pages