Biblio

Export 21373 results:
2018
Cyber Defence. North Atlantic Treaty Organization, 2018.
Philips, Mark, Jennifer Cole, and Jennifer Towers. Cyber Norms of Behaviour: Executive Summary. Royal United Services Institute, 2018.
Lohrmann, Dan. "Cyber Range: Who, What, When, Where, How and Why?" Government Technology Magazine 31, no. 2 (2018): 529-551.
Conklin, William Arthur, and Anne Kohnke. Cyber Resilience: An Essential New Paradigm for Ensuring National Survival In 13th International Conference on Cyber Warfare and Security ICCWS 2018. Washington D.C., USA: National Defence University, 2018.
Bodeau, Deborah, Richard Graubart, Rosalie McQuaid, and John Woodill, Jr.. Cyber Resiliency Metrics and Scoring in Practice--Use Case Methodology and Examples. The MITRE Corporation, 2018.
M.-E, Paté-Cornell, P Keller, M. Smith, and M Kuypers. "Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies." Risk Analysis 2018 38(2) (2018): 226-241.
Polimirova, Dimitrina, Velizar Shalamanov, Nikolai Stoyanov, Todor Tagarev, Yantsislav Yanakiev, George Sharkov, Yavor Papazov, Vasil Rizov, and Krassimira Ivanova. Cyber Security and Opportunities for Application of Innovative Technologies in the work of the State Administration in Bulgaria. Sofia: Bulgarian Academy of Sciences, 2018.
Abu-Taieh, Evon M. O.. Cyber Security Body of Knowledge In IEEE 7th International Symposium on Cloud and Service Computing., 2018.
M., Spremić, Šimunic A., Ao S.I., L. Gelman, D.W.L Hukins, A Hunter, and A.M. Korsunsky. Cyber Security Challenges in Digital Economy In World Congress on Engineering WCE. Vol. vol. I. London, UK, 2018.
Halim, Fatemeh, Salman Yussof, and Mohd Ezanee Rusli. "Cyber Security Issues in Smart Meter and Their Solutions." International Journal of Computer Science and Network Security 18, no. 3 (2018): 99-109.
Ministry for Europe and Foreign Affairs. Cyber Security: Paris Call of 12 November 2018 for Trust and Security in the Cyber Space. France Diplomacy, 2018.
Valeriano, Brandon, Benjamin Jensen, and Ryan C. Maness. Cyber Strategy: The Evolving Character of Power and Coercion. Oxford Scholarship Online, 2018.
Moore, Barbara N.. Cyber Threats in e-Government. Vol. Doctor of business administration. Northcentral University, 2018.
Polatidis, Nikolaos, Michalis Pavlidis, and Haralambos Mouratidis. "Cyber-attack Path Discovery in a Dynamic Supply Chain Maritime Risk Management System." Computer Standards & Interfaces 56 (2018): 74-82.
Hansel, Mischa. "Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks." Journal of International Relations and Development 21, no. 3 (2018): 523-551.
Dupuy, Arnold C.. "Cyber-Energy Infrastructure Vulnerabilities in the Hybrid Warfare Environment: Some DoD Mitigation Efforts." Information & Security: An International Journal 39, no. 2 (2018): 163-174.
Koola, Paul Mario. Cybersecurity – A Systems Perspective In Dynamic Positioning Con¬ference, Marine Technology Society., 2018.
Cybersecurity Framework. NIST, USA, 2018.
Sedenberg, Elaine M., and James X. Dempsey. Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs., 2018.
"Cybersecurity law." State Gazette (2018).
Maschovitis, Chris. Cybersecurity Program Development for Business. Wiley, 2018.
Shea, Jamie. "Cyberspace as a Domain of Operations." MCU Journal 9, no. 2 (2018): 133-150.
Berk, Gábor. "Cyberspace, Its Dangers and the Current Situation of Cyber Defense in Hungary." National Security Review 3 (2018): 5-21.
MARISA. D3.2 MARISA Services Description Document., 2018.
Rai, Siddhant, Akshayanand Raut, Akash Savaliya, and Radha Shankarmani. Darwin: convolutional neural network based intelligent health assistant In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)., 2018.

Pages