Biblio

Export 21373 results:
2019
Vilander, Jaakko, Antti-Tuomas Pulkka, Ville Erkkilä, Erkki Saarikoski, and Teija Norri-Sederholm. "Suomalaisten käsityksiä sodan sekä kyber- ja informaatiosodankäynnin uhkasta." Tiede Ja Ase 1 (2019).
Supervision and control. The Constitution Protection Bureau, 2019.
Hardwick, Jialin, and Alistair R. Anderson. "Supplier-customer engagement for collaborative innovation using video conferencing: A study of SMEs." Industrial Marketing Management 80 (2019): 43-57.
Pandey, Shipra, Rajesh K. Singh, and Angappa Gunasekaran. "Supply chain risks in Industry 4.0 environment: review and analysis framework." In Production Planning & Control: The Management of Operations ., 2019.
Beuran, Razvan, Dat Tang, Zheyu Tan, Shinobu Hasegawa, Yasuo Tan, and Yoichi Shinoda. "Supporting cybersecurity education and training via LMS integration: CyLMS." Education and Information Technologies 24 (2019): 3619-3643.
Khraisat, Ansam, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. "Survey of intrusion detection systems: techniques, datasets and challenges." Cybersecurity 2 (2019).
SysSec Red Book Web Page., 2019.
Zaslavskyi, Volodymyr, and Maya Pasichna. "System Approach Towards the Creation of Secure and Resilient Information Technologies in the Energy Sector." Information & Security: An International Journal 43, no. 3 (2019): 318-330.
Shchoholiev, Maksym, and Violeta Tretynyk. "The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks." Information & Security: An International Journal 43, no. 3 (2019): 375-382.
Bertolino, Antonia, Guglielmo De Angelis, Micael Gallego, Boni García, Francisco Gortázar, Francesca Lonetti, and Eda Marchetti. "A Systematic Review on Cloud Testing." Systematic Review on Cloud Testing 52, no. 5A (2019).
Molodetska, Kateryna, and Yuriy Tymonin. "System-dynamic models of destructive informational influence in social networking services." International Journal of 3D Printing 3, no. 2 (2019): 137-146.
T/8029th Bill proposal . Prime Minister’s Office, 2019.
Pernin, Christopher G., Jakub P. Hlavka, Matthew E. Boyer, John Gordon, IV, Michael Lerario, Jan Osburg, Michael Shurkin, and Daniel C. Gibson. Targeted interoperability: A new imperative for multinational operations. RAND Corporation, 2019.
Tumkevič, Agnija. Tarptautinio bendradarbiavimo ir konflikto potencialas kibernetinėje erdvėje. Vol. Daktaro disertacija. Vilniaus Universitetas, 2019.
Mestric, Ivana Ilic, Arvid Kok, Giavid Valiyev, and Michael Street. Technical Report: Exploration of NATO Exercise Big Data for Lessons Learned. The Hague: NCI Agency, 2019.
Srivastava, Rachit. "Terrorism in Central Asia." Research journal of social sciences 10, no. 7 (2019): 179-185.
Rózsa, Tibor. "Theory, Practice and Tendencies of Information Operations." Defence Review 5 (2019): 82-84.
Repussard, Eva-Nour. There Is No Attribution Problem, Only a Diplomatic One. King’s College University, 2019.
Andreev, Metodi. There was nothing in the reports of the special services about Russian espionage and Gebrev’s poisoning. FrogNews, 2019.
Iliev, Ilia. They are pointing to Russia, aiming at Europe. Trud, 2019.
Dalto, Jeffrey. The Three Phases of Risk Assessment: Risk Management Basics In Vector solutions, Convergence training., 2019.
Minchev, Zlatogor, Pavlin Kutinchev, and Ivan Gaydarski. Top 10 live threats to cyberspace in 2019 In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019.
Madry, Aleksander, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. "Towards Deep Learning Models Resistant to Adversarial Attacks." arXiv e-prints arXiv:1706.06083 (2019).
Dang, Hung, Tien Dinh, Eechien Chang, Qian Lin, and Beng Ooi. Towards scaling blockchain systems via sharding In 2019 International Conference on Management of Data (SIGMOD '19)., 2019.
Traficom – About us., 2019.

Pages