Biblio
Export 21408 results:
Filters: Filter is [Clear All Filters]
Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats." In Cyberspace. Books on Demand, 2019.
"Cyberspace (Definition)., 2019.
Cyberwar in Russian and USA Military-Political Thought: A Comparative View." Information & Security: An International Journal 43, no. 3 (2019): 349-361.
"CYREX 2018 Web Page., 2019.
Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction." In Digital Currency: Breakthroughs in Research and Practice. IGI Global, 2019.
"The Data Sharing Economy: On the Emergence of New Intermediaries." International Review of Intellectual Property and Competition Law 50 (2019): 4-29.
"Decision-Making Method for Estimating Malware Risk Index." Applied Sciences 9, no. 22 (2019): 4943.
"Defence against foreign influence -a value-based approach to define and assess harm, and to direct defence measures In FFI-RAPPORT . Norwegian Defence Research Establishment (FFI) , 2019.
Defending against today’s critical threats In 2019 Threat Report. Cisco, 2019.
Deficiencies in Electoral Security: Outcomes of the 2007 and 2013 Kenyan Elections. Vol. Master's thesis. Harvard Extension School, 2019.
Defining the digital twin: 7 essential steps. ICE - Institution of Civil Engineers, 2019.
Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience. Washington, DC: MITRE, 2019.
The Demise of the INF Treaty: What Are the Consequences for NATO In Policy Brief, European Leadership Network., 2019.
Democracy in Retreat: Freedom in the World 2019. Washington, DC: Freedom House, 2019.
Democratic Backsliding in the European Union In Oxford Research Encyclopedia of Politics., 2019.
Deployment Techniques in Wireless Sensor Networks, Coverage and Connectivity: A Survey." IEEE Access 7 (2019): 28940-28954.
"Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems." Information & Security: An International Journal 43, no. 2 (2019): 196-214.
"Designing of Functionally Stable Information Systems Optimal for a Minimum of Losses - CADSM 2019." In 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM). Polyana-Svalyava (Zakarpattya), UKRAINE, IEEE Ukraine Section, IEEE Ukraine Section (West), 2019.
"Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT) . Accra, Ghana: IEEE - Institute of Electrical and Electronics Engineers , 2019.
Developing Cyber Resilient Systems: A Systems Security Engineering Approach In NIST Special Publication 800-160. Vol. 2. Gaithersburg, MD: National Institute of Standards and Technology, 2019.
Development of software for analysis and forecasting of information operations In Proceedings of the scientific-practical conference of cadets (students), graduate students, doctoral students and young scientists "Topical issues of special information and telecommunications systems. Kyiv: Institute of Special Communications and Information Protection of National Technical University of Ukraine «Igor Sikorsky Kyiv Polytechnic Institute», 2019.
DeviceLock Web Page., 2019.