Export 21189 results:
Filters: Filter is [Clear All Filters]
Blockchain in Agriculture In Information & Security: An International Journal. Vol. 49., 20212.
"Editorial." Information & Security: An International Journal 30, no. 1 (In Press): 1-10.
Availability as a Cloud Service for Control System of Critical Energy Infrastructure In CEUR Workshop Proceedings., 2104.
Cyber Security Compliance Among Remote Workers." In Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, 343-369. Cham: Springer, 2023."
Game theory in network security for digital twins in industry." Digital Communications and Networks (2023)."
Interpretability of AI Systems in Electronic Governance In International Conference on Electronic Governance with Emerging Technologies, EGETC 2022: Electronic Governance with Emerging Technologies ., 2023.
Linguistic diversity in media and state language proficiencies: evidence from Hungarian minority regions in central-Eastern Europe." Regional & Federal Studies (2023)."
Opérations cognitives: Les sciences et neurosciences cognitives au service de l’action stratégique." DSI (Défense et Sécurité Internationale) DSI (Défense et Sécurité Internationale) 163 (2023): 92-97."
Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece." Applied Sciences 13, no. 2 (2023)."
The 3Cs of Colonisation and their Impacts on African Slavery: The Nigeria’s Experience ." Black Theology: An International Journal 20, no. 1 (2022)."
5 Blockchain-Based Cybersecurity Solutions for Industry 4.0 Applications." In Artificial Intelligence and Cybersecurity: Advances and Innovations, 69., 2022."
Albania Moving from Security Receiver to Security Provider." In Peace and Security in the Western Balkans: A Local Perspective. Taylor & Francis, 2022."
Analysis of E-skills Found in Job Postings In Safety, Security and Risk Management. Vol. Bachelor of Business Administration. Laurea University of Applied Sciences , 2022.
An Analysis of Government Capabilities in Countering Terrorist Financing in Indonesia. Vol. Doctor of Philosophy. Australian National University, 2022.
Analysis of strategic stakeholders in the Western Balkans." Security and Defence Quarterly (2022)."
Analytical hierarchical process for assessment and selection of secure software solutions. Varna, Bulgaria: Nikola Vaptsarov Naval Academy , 2022.
Applying Defense-In-Depth to Defend Against Russian State-Sponsored Disinformation Campaigns. Vol. Master of Science in Cybersecurity. Utica University, 2022.
Applying Machiavellian Discourses to Russian Hybrid Warfare In Graduate School of Social Sciences. Vol. Master of Arts. Middle East Technical University, 2022.
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage." Information & Security: An International Journal 53, no. 1 (2022): 78-88 ."
Artificial intelligence as the cognitive value of heuristic models." Radioelectronic and Computer Systems 2 (2022)."
As strong as the weakest link. Transport and supply chain security." Transport Reviews (2022)."
Automated Full Scene Parsing for Marine ASVs Using Monocular Vision." Journal of Intelligent & Robotic Systems volume 104 (2022)."
The ‘Balance’ As a Panacea for Achieving (Cyber)Security In IT4Sec Reports., 2022.
Between Kiev and Venice - The Cognitive Warfare and the Biennale of Venice." Security Science Journal 2 (2022)."