Biblio

Export 21373 results:
2018
Hershtein, Lucas Oro. Ḥākimiyyah 2.0: construyendo un khilāfah virtual In Facultad de Ciencias Sociales y Jurídicas, Instituto de Relaciones Internacionales. Vol. Maestría. Universidad Nacional de La Plata, 2018.
Gupta, Rajneesh. Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain . Packt, 2018.
Matláry, Janne Haaland. Hard Power in Hard Times: Can Europe Act Strategically?. Cham: Palgrave Macmillan, 2018.
Bhunia, Swarup, and Mark Tehranipoor. Hardware Security: A Hands-on Learning Approach. San Francisco, USA: Morgan Kaufmann, 2018.
Health expenditure, public (% of GDP) – Country Ranking. Index Mundi, 2018.
"Here’s How Hostile States Are Hiding behind ‘independent’ Hackers." The Washington Post (2018): 1 February.
Gasimov, Zaur. Historical Dictionary of Azerbaijan. Rowman & Littlefield, 2018.
History of Security Police., 2018.
Homepage of the Bulgarian Military Union “Shipka” ., 2018.
Ciampaglia, Giovanni L., Azadeh Nematzadeh, Filippo Menczer, and Alessandro Flammini. "How Algorithmic Popularity Bias Hinders or Promotes Quality." Scientific reports 8, Article number: 15951, no. 1 (2018).
F.Ryman-Tubb, Nick, Paul Krause, and Wolfgang Garn. "How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark." Engineering Applications of Artificial Intelligence 76 (2018): 130-157.
Ness, Susan, and Peter Chase. How GDPR Could Affect the Transatlantic Relationship. GMF (The German Marshall Fund), 2018.
Orenstein, Mitchell A., and Peter Kreko. "How Putin’s Favorite Biker Gang Infiltrated NATO." Foreign Affairs (2018).
Kruzel, John. How Russian Trolls Exploited Parkland Mass Shooting on Social Media. Politifact, 2018.
Monov, Lyubomir, and Maksim Karev. "How to Counter Hybrid Threats?" Information & Security: An International Journal 39, no. 2 (2018): 113-126.
Chuquicusma, Maria, Sarfaraz Hussein, Jeremy Burt, and Ulas Bagci. How to fool radiologists with generative adversarial networks? a visual turing test for lung cancer diagnosis In 2018 IEEE 15th international symposium on biomedical imaging (ISBI 2018)., 2018.
Biden, Jr., Joseph R., and Michael Carpenter. "How to Stand Up to the Kremlin. Defending Democracy Against Its Enemies." Foreign Affairs (2018): 45.
Lemieux, Frederic. How to Tackle Cybersecurity Risks More Effectively. Georgetown University, School of Continuing Studies, 2018.
Mercier, Denis. "How will artificial intelligence and disruptive technologies transform military operations and organizations?" In NATO Science and Technology Organisation conference Bordeaux. Bordeaux: NATO Supreme Allied Commander Transformation, 2018.
Georgiev, Venelin. The Human Factor in Cybersecurity. Sofia: Avangard, 2018.
Hybrid CoE, (The European Centre of Excellence for Countering Hybrid Threats)., 2018.
Milushev, Lychezar, and Stoycho Panev. "Hybrid Threats, Challenges and Possibilities for Building Institutional Capabilities." Information & Security: An International Journal 39, no. 2 (2018): 143-148.
The Hybrid War (group on Facebook)., 2018.
Shalamanov, Velizar. Hybrid warfare against (the naming of) the Hybrid warfare., 2018.
Keszely, László. "Hybrid Warfare and National Resilience, or a Comprehensive Approach Reloaded." Katonai Jogi és Hadijogi Szemle [Military Law and Military Law Review] 1 (2018): 29-62, quote on 61-62.

Pages