Export 17886 results:
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
Saranov, Nikola. "Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
Larsen, Marie Hjelseth, and Susann Øvretveit. Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
CoSoSys Endpoint Protector Web Page., 2019.
Ogar, Sarah. Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Turčaník, Michal, and Martin Javurek. "Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019 In Security Report. Check Point Research, 2019.
Sharkov, George. "Cyber Resilience of Systems-of-Intelligent-Systems." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Pöyhönen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajamäki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256.
Shaikh, Siraj Ahmed. "Cyber-Physical Systems Security: Research Challenges and Opportunities.", 2019.
Oloidi, Aramide. Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study. Vol. PhD dissertation. San Diego, CA: Northcentral University, 2019.
Morris, Gerald F.. The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada. Northcentral University, 2019.
Gonzalez, III, Joaquin Jay, and Roger L. Kemp. Cybersecurity: Current Writings on Threats and Protection . Jefferson, NC: McFarland, 2019.
"Cyberspace." In The United Nations Terminology Database., 2019.
The National Institute of Standards and Technology. Cyberspace (Definition)., 2019.
Raychev, Yavor. "Cyberwar in Russian and USA Military-Political Thought: A Comparative View." Information & Security: An International Journal 43, no. 3 (2019): 349-361.
CYREX 2018 Web Page., 2019.
Zareapoor, Masoumeh, Pourya Shamsolmoali, and Afshar M. Alam. "Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction." In Digital Currency: Breakthroughs in Research and Practice. IGI Global, 2019.
Kveberg, Torbjørn, Vårin Alme, and Sverre Diesen. Defence against foreign influence -a value-based approach to define and assess harm, and to direct defence measures In FFI-RAPPORT . Norwegian Defence Research Establishment (FFI) , 2019.
The Defence Innovation Greenhouse., 2019.
Defending against today’s critical threats In 2019 Threat Report. Cisco, 2019.
Sitter, Nick, and Elisabeth Bakke. Democratic Backsliding in the European Union In Oxford Research Encyclopedia of Politics., 2019.
Rajamäki, Jyri. "Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems." Information & Security: An International Journal 43, no. 2 (2019): 196-214.
DeviceLock Web Page., 2019.
Oliveira, Diego F. M., and Kevin S. Chan. "Diffusion of Information in an Online Social Network with Limited Attention." Information & Security: An International Journal 43, no. 3 (2019): 362-374.