Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2019
Kania, Elsa
, and
Emma More
.
The US is Unprepared to Mobilize for Great Power Conflict
. Defense One , 2019.
Google Scholar
RTF
EndNote XML
Andriichuk, Oleh
,
Vitaliy Tsyganok
,
Dmitry Lande
,
Oleg Chertov
, and
Yaroslava Porplenko
.
"
Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition
." In
DIGILIENCE 2019
., 2019.
Google Scholar
RTF
EndNote XML
Green, David R.
,
Jason J. Hagon
,
Crisina Gómez
, and
Billy J. Gregory
.
"
Using Low-Cost UAVs for Environmental Monitoring, Mapping, and Modelling: Examples From the Coastal Zone
." In
Coastal Management: Global Challenges and Innovations
, 465-501. Elsevier, 2019.
Google Scholar
RTF
EndNote XML
Dulschi, Olivia
.
Utilisation of Security Systems in Public Administration
In
Conferinței Științifice Internaționale "Contribuția tinerilor cercetători la dezvoltarea administrației publice"
. Chișinău: Academia de Administare Publică, 2019.
Google Scholar
RTF
EndNote XML
Aaltola, Kirsi
, and
Petteri Taitto
.
"
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
."
Information & Security: An International Journal
43, no. 2 (2019): 123-133.
DOI
Google Scholar
RTF
EndNote XML
Útvary rozviedky na území SSR [Counter-intelligence Departments in the Territory of the Slovak Socialist Republic]
., 2019.
Google Scholar
RTF
EndNote XML
Rublovskis, Raimonds
.
Uzruna 20 gadu jubilejā (Address on the 20th Anniversary)
., 2019.
Google Scholar
RTF
EndNote XML
Enciso, Juan
,
Carlos A. Avila
,
Jinha Jung
,
Sheren Elsayed-Farag
,
Anjin Chang
,
Junho Yeom
,
Juan Landivar
,
Murilo Maeda
, and
Jose C. Chavez
.
"
Validation of Agronomic UAV and Field Measurements for Tomato Varieties
."
Computers and Electronics in Agriculture
158 (2019): 278-283.
Google Scholar
RTF
EndNote XML
Valsts drošības dienests (VDD)
., 2019.
Google Scholar
RTF
EndNote XML
Bontchev, Vesselin
.
"
A VBA P-Code Disassembler
." In
DIGILIENCE 2019
. Sofia, Bulgaria, 2019.
Google Scholar
RTF
EndNote XML
Verizon Data Breach Investigation Report 2019
. Verizon business ready, 2019.
Google Scholar
RTF
EndNote XML
Riley, Jacqueline
,
Gina Garza-Reyna
,
Ava Muñoz
,
Gabriella Lawrence
,
Mary Shelton
, and
Angelica Rojas-Paz
.
"
Video-conferencing to promote global awareness
."
Kappa Delta Pi Record
55, no. 1 (2019): 42-45.
Google Scholar
RTF
EndNote XML
McKenzi, Francine
.
Visualizing Canada's Future in the Fifth Dimension
. University of Western Ontario, 2019.
Google Scholar
RTF
EndNote XML
Petrov, Daniel
.
Vultures of Law and Morality
. Legalworld.bg, 2019.
Google Scholar
RTF
EndNote XML
Omelicheva, Mariya
, and
Lawrence Markowitz
.
Webs of Corruption: Trafficking and Terrorism in Central Asia
. New York: Columbia University Press, 2019.
Google Scholar
RTF
EndNote XML
Website: Kosovo Thanks You
., 2019.
Google Scholar
RTF
EndNote XML
Eurostat
.
Western Balkans Countries-EU – International Trade in Goods Statistics
In
Eurostat: Statistics Explained
., 2019.
Google Scholar
RTF
EndNote XML
What are the Top Ten Data Center Best Practices?
. TechXact, 2019.
Google Scholar
RTF
EndNote XML
Akum, Fonteh
,
Illiassou Alio
, and
Habibou Bako
.
What Doesn’t Break Boko Haram in Niger Makes It Stronger
. Institute for Security Studies, 2019.
Google Scholar
RTF
EndNote XML
Afifi, Mahmoud
, and
Michael S. Brown
.
What else can fool deep learning? addressing color constancy errors on deep neural network performance
In
Proceedings of the IEEE International Conference on Computer Vision
., 2019.
Google Scholar
RTF
EndNote XML
Costigan, Sean
, and
Greg Gleason
.
"
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
."
Information & Security: An International Journal
43, no. 1 (2019): 13-20.
DOI
Google Scholar
RTF
EndNote XML
Bulbula, Dilek
,
Hendrik Hakenes
, and
Claudia Lambert
.
"
What Influences Banks’ Choice of Credit Risk Management Practices
."
Theory and Evidence
40 (2019): 1-14.
DOI
Google Scholar
RTF
EndNote XML
Boulton, Clint
.
What is Digital Transformation? A Necessary Disruption
. CIO, 2019.
Google Scholar
RTF
EndNote XML
De Groot, Juliana
.
What is HIPAA Compliance? 2019 HIPAA Requirements
. Digital Guardian, 2019.
Google Scholar
RTF
EndNote XML
De Groot, Juliana
.
What is SOX Compliance? 2019 SOX Requirements & More
. Digital Guardian, 2019.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
81
82
83
84
85
86
87
88
89
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance