Biblio

Export 21404 results:
2018
Taghanaki, Saeid Asgari, Arkadeep Das, and Ghassan Hamarneh. "Vulnerability analysis of chest x-ray image classification against adversarial attacks." In Understanding and Interpreting Machine Learning in Medical Image Computing Applications, 87-94. Springer, 2018.
Ojagbule, Olajide, Hayden Wimmer, and Rami J. Haddad. "Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP." In IEEE, SoutheastCon 2018 . St. Petersburg, FL, USA, 2018.
Black, Ryan. "WannaCry, NotPetya, and Cyberwarfare’s Threat to Healthcare." IncideDigitalHealth (2018).
Luber, Stefan, and Peter Schmitz. Was ist Security Awareness?. Security Insider, 2018.
Khaldi, Habiba, Roman Tandlich, Nosiphiwe P. Ngqwala, and Sunitha Srinivas. "The WASH vulnerability of Algeria’s population and analysis of contributing factors." Crisis Management 17, no. 1 (2018): 11-21.
Petrov, Pavel, Stefan Krumovich, Nikola Nikolov, Georgi Dimitrov, and Vladimir Sulov. Web Technologies Used in the Commercial Banks in Finland In 19th International Conference on Computer Systems and Technologies (CompSys-Tech'18). New York, NY, USA, 2018.
Stowell, Joshua. "What is Hybrid Warfare?" Global Security Review (2018).
Hameed, Nafees. "What Makes a Terrorist." New York Review Daily (2018).
Chaw, Lee Y., and Chun Meng Tang. "What makes learning management systems effective for learning?" Journal of Educational Technology Systems 47, no. 2 (2018): 152-169.
Perez, Celestino. "What Military Education Forgets: Strategy is Performance." War on the Rocks (2018).
Khan, Wahaj Ahmed, Syed Tehseen Jawaid, and Imtiaz Arif. "Where does a nation's wealth go? Evidence from a third world country"." Journal of Money Laundering Control (2018).
White Book 2017. The Armed Forces of Ukraine . Kyiv: Ministry of Defence of Ukraine, 2018.
White Book 2017, The Armed Forces of Ukraine. Ministry of Defence of Ukraine, 2018.
Why You Need to Establish a Cyber Security Culture in Within Your Organization. Cytelligence, 2018.
van Uhm, Daan P.. "Wildlife Crime and Security." In Transnational Crime and Global Security. ABC-CLIO, 2018.
van Uhm, Daan. Wildlife Crime and Security, in Transnational Crime and Global Security. ABC-CLIO, 2018.
Coats, Daniel R.. Worldwide Threat Assessment of the US Intelligence Community. Washington D.C: Director of National Intelligence, 2018.
Tredgold, Thomas. "XXXIV. On the Medulus of Elasticity of Air, and the Velocity of Sound." The Philosophical Magazine 52, no. 245 (2018): 214-216.
Rybczyński, Antoni. ’Zielone ludziki’ na Bałtyku? Spektakularna akcja fińskich służb. TVP Info, 2018.
Zimbabwe Demographics Profile 2018. Index Mundi, 2018.
"Đukić potpisao osnivanje Prave Crne Gore [Djukic Signed the Founding of True Montenegro]." Pobjeda (2018): 3.
Савчук, В.С.. "Імітаційна модель поширення продукції психологічного впливу в соціальних мережах." Проблеми створення, випробування, застосування (2018).
Крстић, Марко М.. "Анализа Система Националне Безбедности Републике Бугарске." Војно Дело 2 (2018).
. Бизнес и сигурност. София: Авангард, 2018.
Shalamanov, Velizar. Киберсигурност и възможности за приложение на иновативни технологии в работата на държавната администрация в България., 2018.

Pages