Biblio

Export 21409 results:
Filters: Filter is   [Clear All Filters]
2018
10 IT management certifications for IT leaders. CIO, Communications, IDG, 2018.
2018 Aspen Cyber Summit., 2018.
2018 Best Practice Guidelines for the EU Code of Conduct on Data Centre Energy Efficiency In JRC Technical Reports. European Commission, 2018.
2018 Payment Security Report. Verizon, 2018.
Jiang, Luo, Juyong Zhang, Bailin Deng, Hao Li, and Ligang Liu. "3D Face Reconstruction with Geometry Details from a Single Image." IEEE Transactions on Image Processing 27, no. 10 (2018): 4756-4770.
Seif, George. The 5 Clustering Algorithms Data Scientists Need to Know., 2018.
Abschlussbericht des Sonderbeauftragten des Senats für die Aufklärung des Handelns der Berliner Behörden im Fall AMRI. Berlin.de , 2018.
J., Singh, Reed C., Cobbe J., Crowcroft J., and Millard C.. "Accountability in the IOT: Systems, Law, and Ways Forward." Computer 51, no. 7 (2018): 54-65.
United States Cyber Command. Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command., 2018.
Commission, European. Action Plan against Disinformation In High Representative of the Union for Foreign Affairs and Security Policy. Brussels, 2018.
Dong, Ying, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, and Wenjie Wang. "An adaptive system for detecting malicious queries in web attacks." Science China Information Sciences 61 (2018).
Akgül, Yakup. "Adoption of E-Government Services in Turkey." AJIT-e: Online Academic Journal of Information Technology 9, no. 32 (2018).
Brown, T.B., D. Mané, A. Roy, M. Abadi, and J. Gilmer. "Adversarial Patch." arXiv e-prints (2018).
Roloff, Ralf, and Pàl Dunay. "The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank." Connections: The Quarterly Journal 17, no. 2 (2018): 19-35.
Mylrea, Michael. AI Enabled Blockchain Smart Contracts: Cyber Resilient Energy Infrastructure and IoT In 2018 AAAI Spring Symposium Series., 2018.
Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US Department of Homeland Security, 2018.
Alliance C3 Strategy. NATO, 2018.
Antonov, Petar, and Valentina Аntonova. Analiz na sigurnosta na parolnite frazi In Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni". Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018.
Kumari, Priyanka, and Smita Prava Mishra. "Analysis of Credit Card Fraud Detection Using Fusion Classifiers." In Computational Intelligence in Data Mining, 111-122., 2018.
M. Gunduz, Zekeriya, and Resul Das. "Analysis of Cyber-attacks on Smart Grid Applications." In 2018 International Conference on Artificial Intelligence and Data Processing (IDAP). Malatya, Turkey, 2018.
Notarmuzi, Daniele, and Claudio Castellano. "Analytical Study of Quality-Biased Competition Dynamics for Memes in Social Media." arXiv preprint arXiv:1803.08511 (2018).
Shao, Chengcheng, Pik-Mai Hui, Lei Wang, Xinwen Jiang, Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. "Anatomy of an Online Misinformation Network." PloS One 13, no. 4 (2018).
Android Devices Ship with Pre-installed Malware. Avast Threat Labs, 2018.

Pages