Biblio
Export 21409 results:
Filters: Filter is [Clear All Filters]
European Cybersecurity Centres of Expertise Map – Definitions and Taxonomy. Luxembourg: Publications Office of the European Union, 2018.
European Cybersecurity Centres of Expertise Map - Definitions and Taxonomy. Luxembourg: Publications Office of the European Union, 2018.
The European Deterrence Initiative: A Budgetary Overview. Congressional Research Service, 2018.
A Europeanized NATO? The Alliance Contemplates the Trump Era and Beyond. War on the Rocks, 2018.
Evaluating Automated Software Verification Tools." In IEEE 11th International Conference on Software Testing, Verification and Validation (ICST). Vasteras, Sweden, 2018.
"Evaluating Test Data Generation for Untyped Data Structures Using Genetic Algorithms." In IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). Vasteras, Sweden , 2018.
"Evaluation of Operation Restore: A Brief Intervention for First Responders Exposed to Traumatic Events." Traumatology 25, no. 3 (2018): 162-171.
"The Evolution and Development of the IDF." In Routledge Hand-book on Israeli Security. Routledge, 2018.
"Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief." Information & Security: An International Journal 40, no. 2 (2018): 167-180.
"An Examination of the Changes That Should Be Implemented in Florida's Homeland Security Counterterrorism Initiatives Post 9/11 to Prevent Against Threats and Attacks . Vol. Doctor of Management. Colorado Technical University, 2018.
Examining Foresighted Decisions Based on Lessons Learned Using a Qualitative Exploratory Study. Northcentral University, 2018.
Executive Order Reimposing Certain Sanctions with Respect to Iran. The White House , 2018.
Experiences Using Virtual Systems During Critical Incidents at Universities: A Phenomenological Approach. Capella University, 2018.
Expert Framework for Measuring the Institutional Capabilities to Counter Hybrid Threats: Empirical Data Analysis." Information & Security: An International Journal 39, no. 3 (2018): 237-254.
"Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior." Computers and Security 77 (2018).
"Exploring adversarial examples." In Understanding and Interpreting Machine Learning in Medical Image Computing Applications, 70-78. Springer, 2018.
"Extending the Airport Boundary: Connecting Physical Security and Cybersecurity." Journal of Airport Management 12, no. 3 (2018): 236-247.
"The Fabricated Hadith: Islamic Ethics and Guidelines of Hadith Dispersion in Social Media." The Turkish Online Journal of Design, Art and Communication - TOJDAC Special Edition (2018): 804-808.
"Fake News is Part of a Bigger Problem: Automated Propaganda." Columbia Journalism Review (2018).
"The Fakes in Social Media: Design, Transformation, Insertion in Mass Consciousness." Rostov Electronic Gazette (in Russian) 17 (2018).
"Family Well-being and Radicalism in Digital Era In Proceedings of the Borneo International Conference on Education and Social Sciences (BICESS 2018)., 2018.
Finnish Soldiers find ‘Secret Russian Military Bases’ after Raiding Mysterious Island." Independent (2018).
"