Biblio
Export 21408 results:
Filters: Filter is [Clear All Filters]
Cognitive Space for Online and Offline Learning: A Convergent Approach." The Educational Review, USA 6, no. 4 (2022): 109-123.
"A Comprehensive Review on the Cyber Security Methods in Indian Organisation." Int. J. Advance Soft Compu. Appl, 14, no. 1 (2022).
"Computer Information Systems and Industrial Management In 21st International Conference CISIM 2022. Barranquilla, Colombia, 2022.
Conceptual model for capability planning in a military context – A systems thinking approach." Systems Engineering (2022): 1-18.
"Confronting the Myth of Soft Power in U.S. Foreign Policy. Rowman & Littlefield, 2022.
Consciousness Management by Extremist Organizations With the Means of Internet Communication." Humanities of the South of Russia 11 (54), no. 2 (2022).
"Consolidating cybersecurity in Europe: A case study on job profiles assessment." Computers & Security (2022).
"Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment." Information & Security: An International Journal 51, no. 1 (2022): 25-35.
"Contemporary Safety Management of Virtual Golf in South Korea." Journal of Sport and Applied Science 6, no. 1 (2022): 01-04.
"Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication In Department of Educational Psychology. Vol. Doctor of Philosophy. University of Alberta, 2022.
Counterintelligence In The Balkans And Eastern Mediterranean. The Counterintelligence Methods Of Transnational Groups." In International Scientific Conferince Strategies XXI., 2022.
"The Critical Black Sea Zone." Connections: The Quarterly Journal 21, no. 4 (2022): 115-128.
"Critical Information Framework against Cyber-Attacks using Artificial Intelligence and Big Data Analytics In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Greater Noida, India, 2022.
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States." All-Russian Criminological Journal 16, no. 1 (2022): 57-72.
"CUS-RF-Based Credit Card Fraud Detection with Imbalanced Data." Journal of Risk Analysis and Crisis Response 12, no. 3 (2022): 110-123 .
"Cyber conflict short of war: a European strategic vacuum ." European Security (2022).
"Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners In 35th International BCS Human-Computer Interaction Conference. Keele: Keele University, 2022.
Cyber Hygiene Issues in the Naval Security Environment." Information & Security: An International Journal 53, no. 2 (2022): 205-218.
"Cyber hygiene knowledge, awareness, and behavioral practices of university students." Information Security Journal: A Global Perspective (2022).
"Cyber Persistence Theory: Redefining National Security in Cyberspace. Oxford University Press, 2022.
Cyber Red Teaming: Overview of Sly, an Orchestration Tool." Information & Security: An International Journal 53, no. 2 (2022): 273-286.
"Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard In IT4Sec Reports., 2022.
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends." Information 13, no. 22 (2022).
"Cyber-Governance-Struktur im Vergleich In Sozialwissenschaftliche Fakultät. Vol. Bachelorarbeit. Ludwig-Maximilians-Universität München, 2022.
Cybersecurity Awareness Modeling Associated with Influential Factors Using AHP Technique: A Case of Railway Organizations in Thailand." In 2022 International Conference on Decision Aid Sciences and Applications (DASA). Chiangrai, Thailand, 2022.
"