Biblio

Export 21373 results:
2018
Akgül, Yakup. "Adoption of E-Government Services in Turkey." AJIT-e: Online Academic Journal of Information Technology 9, no. 32 (2018).
Brown, T.B., D. Mané, A. Roy, M. Abadi, and J. Gilmer. "Adversarial Patch." arXiv e-prints (2018).
Roloff, Ralf, and Pàl Dunay. "The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank." Connections: The Quarterly Journal 17, no. 2 (2018): 19-35.
Mylrea, Michael. AI Enabled Blockchain Smart Contracts: Cyber Resilient Energy Infrastructure and IoT In 2018 AAAI Spring Symposium Series., 2018.
Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US Department of Homeland Security, 2018.
Alliance C3 Strategy. NATO, 2018.
Antonov, Petar, and Valentina Аntonova. Analiz na sigurnosta na parolnite frazi In Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni". Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018.
Kumari, Priyanka, and Smita Prava Mishra. "Analysis of Credit Card Fraud Detection Using Fusion Classifiers." In Computational Intelligence in Data Mining, 111-122., 2018.
M. Gunduz, Zekeriya, and Resul Das. "Analysis of Cyber-attacks on Smart Grid Applications." In 2018 International Conference on Artificial Intelligence and Data Processing (IDAP). Malatya, Turkey, 2018.
Notarmuzi, Daniele, and Claudio Castellano. "Analytical Study of Quality-Biased Competition Dynamics for Memes in Social Media." arXiv preprint arXiv:1803.08511 (2018).
Shao, Chengcheng, Pik-Mai Hui, Lei Wang, Xinwen Jiang, Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. "Anatomy of an Online Misinformation Network." PloS One 13, no. 4 (2018).
Android Devices Ship with Pre-installed Malware. Avast Threat Labs, 2018.
Annual Report on the Status of Defense and the Armed Forces. Sofia: Ministry of Defense, 2018.
Annual Report on the Status of Defense and the Armed Forces ., 2018.
Roeva, Olympia. "Application of Artificial Bee Colony Algorithm for Model Parameter Identification." In Innovative Computing, Optimization and Its Applications, 285-303. Springer, Cham, 2018.
Hristozov, Ivan. "Application of Information and Communications Technologies and Means of Radio-electronic Warfare in Hybrid War." Information & Security: An International Journal 39, no. 3 (2018): 265-274.
Živec, Katarina. Application of Mackinder’s Heartland Theory to Past and Present Geopolitical Significance of Central Asia In Perspectives., 2018.
Aleksandrova, Veselina, KostadinVarbanov, and Violeta Vasileva. Application of Sustainable Technologies and Internet of Things in the Security and Defense Area In International Scientific Conference "Challenges to the EU and NATO in the context of radicalization, terrorism and migration. Sofia: Military Academy “G.S. Rakovski”, 2018.
Pustišek, M., and A. Kos. "Approaches to front-end IoT application development for the ethereumblockchain." Procedia Computer Science 129 (2018): 410-419.
Morgan-Owen, David. "Approaching a Fork in the Road: Professional Education and Military Learning." War on the Rocks (2018).
On the Approval of the Strategy for Development of the Defence-Industrial Complex of Ukraine for the Period up to 2028 In Order of the Cabinet of Ministers of Ukraine., 2018.
Bahout, Joseph. Arab Horizons: Pitfalls and Pathways to Renewal . Washington, DC: Carnegie Endowment for International Peace, 2018.
Branch, Anthony R.. "Armenia and the South Caucasus: A New Security Environment." Connections: The Quarterly Journal 17, no. 2 (2018): 47-60.
Luhn, Alec. "Armenia Opposition Leader Nikol Pashinyan Elected PM by Parliament." The Telegraph (2018).
Armenian Ceasefire Violation: Azerbaijan’s Serviceman Killed. Trend , 2018.

Pages