Biblio

Export 21404 results:
2018
Gerlich, Ralf, and Christian R. Prause. "Evaluating Test Data Generation for Untyped Data Structures Using Genetic Algorithms." In IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). Vasteras, Sweden , 2018.
Boothroyd, Roger A., Shawna Green, and Anne Dougherty. "Evaluation of Operation Restore: A Brief Intervention for First Responders Exposed to Traumatic Events." Traumatology 25, no. 3 (2018): 162-171.
Amidror, Yaakov. "The Evolution and Development of the IDF." In Routledge Hand-book on Israeli Security. Routledge, 2018.
Tagarev, Todor, and Valeri Ratchev. "Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief." Information & Security: An International Journal 40, no. 2 (2018): 167-180.
Mitchell, Patricia. An Examination of the Changes That Should Be Implemented in Florida's Homeland Security Counterterrorism Initiatives Post 9/11 to Prevent Against Threats and Attacks . Vol. Doctor of Management. Colorado Technical University, 2018.
Barber, Alexander W.. Examining Foresighted Decisions Based on Lessons Learned Using a Qualitative Exploratory Study. Northcentral University, 2018.
O'Donnell, John, and Gederts Gelzis. Exclusive: Latvia probes whether Russian money flows used to meddle in Europe. Reuters, 2018.
Executive Order Reimposing Certain Sanctions with Respect to Iran. The White House , 2018.
Plummer, Eric S.. Experiences Using Virtual Systems During Critical Incidents at Universities: A Phenomenological Approach. Capella University, 2018.
Georgieva, Teodora, and Plamen Petkov. "Expert Framework for Measuring the Institutional Capabilities to Counter Hybrid Threats: Empirical Data Analysis." Information & Security: An International Journal 39, no. 3 (2018): 237-254.
Gerber, Nina, Paul Gerber, and Melanie Volkamer. "Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior." Computers and Security 77 (2018).
Kügler, David, Alexander Distergoft, Arjan Kuijper, and Anirban Mukhopadhyay. "Exploring adversarial examples." In Understanding and Interpreting Machine Learning in Medical Image Computing Applications, 70-78. Springer, 2018.
Willemsen, Bert, and Menno Cadee. "Extending the Airport Boundary: Connecting Physical Security and Cybersecurity." Journal of Airport Management 12, no. 3 (2018): 236-247.
Usman, A. H., and R. Wazir. "The Fabricated Hadith: Islamic Ethics and Guidelines of Hadith Dispersion in Social Media." The Turkish Online Journal of Design, Art and Communication - TOJDAC Special Edition (2018): 804-808.
Ingram, Mathew. "Fake News is Part of a Bigger Problem: Automated Propaganda." Columbia Journalism Review (2018).
Pocheptsov, Georgii. "The Fakes in Social Media: Design, Transformation, Insertion in Mass Consciousness." Rostov Electronic Gazette (in Russian) 17 (2018).
Anwar, Moh Khoerul, and Muhammad Wildan. Family Well-being and Radicalism in Digital Era In Proceedings of the Borneo International Conference on Education and Social Sciences (BICESS 2018)., 2018.
Higgins, Andrew. "Finnish Soldiers find ‘Secret Russian Military Bases’ after Raiding Mysterious Island." Independent (2018).
Τασσόπουλος, Ηλίας. Fire early warning system., 2018.
Pocheptsov, Georgii. The first cognitive war in the world (Ukraine, Crimea, Russia)., 2018.
Flood report. Government of Zimbabwe – Directorate of Civil Protection, 2018.
Weighill, Rob. Florence Caub, The Cauldron: NATO’s Campaign in Libya. London: Hurst and Company, 2018.
Mihajlović, Marko, and Nikola Popović. Fooling a neural network with common adversarial noise In 2018 19th IEEE Mediterranean Electrotechnical Conference (MELECON)., 2018.
US NCSC. Foreign Economic Espionage in Cyberspace. National Counterintelligence and Security Center, 2018.
Bentzen, Naja. "Foreign Influence Operations in the EU." In European Parliamentary Research Service Briefing., 2018.

Pages