Export 17886 results:
Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112."
Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61."
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019 In Security Report. Check Point Research, 2019.
Cyber Resilience of Systems-of-Intelligent-Systems." In DIGILIENCE 2019. Sofia, Bulgaria, 2019."
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256."
Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study. Vol. PhD dissertation. San Diego, CA: Northcentral University, 2019.
The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada. Northcentral University, 2019.
Cybersecurity: Current Writings on Threats and Protection . Jefferson, NC: McFarland, 2019.
"Cyberspace." In The United Nations Terminology Database., 2019.
Cyberspace (Definition)., 2019.
Cyberwar in Russian and USA Military-Political Thought: A Comparative View." Information & Security: An International Journal 43, no. 3 (2019): 349-361."
CYREX 2018 Web Page., 2019.
Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction." In Digital Currency: Breakthroughs in Research and Practice. IGI Global, 2019."
Defence against foreign influence -a value-based approach to define and assess harm, and to direct defence measures In FFI-RAPPORT . Norwegian Defence Research Establishment (FFI) , 2019.
Defending against today’s critical threats In 2019 Threat Report. Cisco, 2019.
Democratic Backsliding in the European Union In Oxford Research Encyclopedia of Politics., 2019.
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems." Information & Security: An International Journal 43, no. 2 (2019): 196-214."
DeviceLock Web Page., 2019.
Diffusion of Information in an Online Social Network with Limited Attention." Information & Security: An International Journal 43, no. 3 (2019): 362-374."