Biblio

Export 21404 results:
2018
Seif, George. The 5 Clustering Algorithms Data Scientists Need to Know., 2018.
Abschlussbericht des Sonderbeauftragten des Senats für die Aufklärung des Handelns der Berliner Behörden im Fall AMRI. Berlin.de , 2018.
J., Singh, Reed C., Cobbe J., Crowcroft J., and Millard C.. "Accountability in the IOT: Systems, Law, and Ways Forward." Computer 51, no. 7 (2018): 54-65.
United States Cyber Command. Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command., 2018.
Commission, European. Action Plan against Disinformation In High Representative of the Union for Foreign Affairs and Security Policy. Brussels, 2018.
Dong, Ying, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, and Wenjie Wang. "An adaptive system for detecting malicious queries in web attacks." Science China Information Sciences 61 (2018).
Akgül, Yakup. "Adoption of E-Government Services in Turkey." AJIT-e: Online Academic Journal of Information Technology 9, no. 32 (2018).
Brown, T.B., D. Mané, A. Roy, M. Abadi, and J. Gilmer. "Adversarial Patch." arXiv e-prints (2018).
Roloff, Ralf, and Pàl Dunay. "The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank." Connections: The Quarterly Journal 17, no. 2 (2018): 19-35.
Mylrea, Michael. AI Enabled Blockchain Smart Contracts: Cyber Resilient Energy Infrastructure and IoT In 2018 AAAI Spring Symposium Series., 2018.
Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US Department of Homeland Security, 2018.
Alliance C3 Strategy. NATO, 2018.
Antonov, Petar, and Valentina Аntonova. Analiz na sigurnosta na parolnite frazi In Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni". Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018.
Kumari, Priyanka, and Smita Prava Mishra. "Analysis of Credit Card Fraud Detection Using Fusion Classifiers." In Computational Intelligence in Data Mining, 111-122., 2018.
M. Gunduz, Zekeriya, and Resul Das. "Analysis of Cyber-attacks on Smart Grid Applications." In 2018 International Conference on Artificial Intelligence and Data Processing (IDAP). Malatya, Turkey, 2018.
Notarmuzi, Daniele, and Claudio Castellano. "Analytical Study of Quality-Biased Competition Dynamics for Memes in Social Media." arXiv preprint arXiv:1803.08511 (2018).
Shao, Chengcheng, Pik-Mai Hui, Lei Wang, Xinwen Jiang, Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. "Anatomy of an Online Misinformation Network." PloS One 13, no. 4 (2018).
Android Devices Ship with Pre-installed Malware. Avast Threat Labs, 2018.
Annual Report on the Status of Defense and the Armed Forces. Sofia: Ministry of Defense, 2018.
Annual Report on the Status of Defense and the Armed Forces ., 2018.
Roeva, Olympia. "Application of Artificial Bee Colony Algorithm for Model Parameter Identification." In Innovative Computing, Optimization and Its Applications, 285-303. Springer, Cham, 2018.
Hristozov, Ivan. "Application of Information and Communications Technologies and Means of Radio-electronic Warfare in Hybrid War." Information & Security: An International Journal 39, no. 3 (2018): 265-274.
Živec, Katarina. Application of Mackinder’s Heartland Theory to Past and Present Geopolitical Significance of Central Asia In Perspectives., 2018.
Aleksandrova, Veselina, KostadinVarbanov, and Violeta Vasileva. Application of Sustainable Technologies and Internet of Things in the Security and Defense Area In International Scientific Conference "Challenges to the EU and NATO in the context of radicalization, terrorism and migration. Sofia: Military Academy “G.S. Rakovski”, 2018.
Pustišek, M., and A. Kos. "Approaches to front-end IoT application development for the ethereumblockchain." Procedia Computer Science 129 (2018): 410-419.

Pages