Biblio

Export 21373 results:
2018
Sytnik ne smoh predstavit deputatam otchet o dejatelnosti NABU (Сытник не смог представить депутатам отчет о деятельности НАБУ). Novoe Vremia, 2018.
Tackling online disinformation: a European Approach. Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, 2018.
Tackling Online Disinformation: Commission Proposes an EU-wide Code of Practice. EU Commission, 2018.
Take on Data Science and Machine Learning Tools. Gartner , 2018.
Walther, Benjamin. Targeted Killing as a Counterterrorism Strategy: An Empirical Investigation. University of North Carolina Wilmington, 2018.
Task Forces., 2018.
Tasks of the Austrian Armed Forces., 2018.
Kessler, Gary C., Philip J. Craiger, and Jon C. Haass. "A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System." The International Journal on Marine Navigation and Safety of Sea Transportation 12, no. 3 (2018): 429-437.
Hindy, Hanan, Elike Hodo, Ethan Bayne, Amar Seeam, Robert Atkinson, and Xavier Bellekens. A Taxonomy of Malicious Traffic for Intrusion Detection Systems In 2018 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). Glasgow, UK., 2018.
Affairs, Denmark Ministry o. TechPlomacy. Office of Denmark's Tech Ambassador, 2018.
van Merrienboer, Jeroen J. G., and Paul Kirschner. Ten Steps to Complex Learning: A Systematic Approach to Four-Component Instructional Design. Third ed. New York: Routledge, 2018.
Figueroa, Alberto Miguel Ure. Terrorists and Cyberspace: The Digital Battleground. Monterey, California: Naval Postgraduate School, 2018.
Tests Document Readability: Readability Calculator. Online utility.org , 2018.
Turcsányi, Richard Q.. "Theories of Chinese Assertiveness in the South China Sea." In Chinese Assertiveness in the South China Sea. Global Power Shift (Comparative Analysis and Perspectives)., 141-167. Champp: Springer, 2018.
Ceccarelli, Andrea, Tommaso Zoppi, Alexandr Vasenev, Marco Mori, Dan Ionita, Lorena Montoya, and Andrea Bondavalli. "Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach." ACM Transactions on Cyber-Physical Systems 3, no. 2 (2018): article 18.
Akhtar, Naveed, and Ajmal Mian. "Threat of adversarial attacks on deep learning in computer vision: A survey." IEEE Access 6 (2018): 14410-14430.
.S.Suryateja, P. "Threats and Vulnerabilities of Cloud Computing: A Review." International Journal of Computer Sciences and Engineering 6, no. 3 (2018).
TIEMS Chapters., 2018.
"Tiems Contribution to Emergency and Crisis Management." Information & Security: An International Journal 40, no. 2 (2018): 213-214.
TIEMS Mission and Focus., 2018.
TIEMS TQC Certification., 2018.
Thornhil, Paula. "To Produce Strategists, Focus on Staffing Senior Leaders." War on the Rocks (2018).
Kim, Ji-yoon, Chung-ku Kang, and Kil-dong Kim. "To South Korean Youth, North Korea Is Not ‘One of Us’." The Korea Times (2018).
Tools for network planning and optimization., 2018.
"Tool-Supporting Data Protection Impact Assessments with CAIRIS." In 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE)., 2018.

Pages