Biblio

Export 21409 results:
Filters: Filter is   [Clear All Filters]
2018
Savchuk, Vlada. "Graphic Model of The Target Audience of Psychological Influence in Social Networks." Information & Security: An International Journal 41 (2018): 81-93.
GreyEnergy: A Successor to BlackEnergy In White Paper., 2018.
Meyer, Robinson. The Grim Conclusions of the Largest-Ever Study of Fake News: Falsehoods almost always beat out the truth on Twitter, penetrating further, faster, and deeper into the social network than accurate information. The Atlantic, 2018.
Korsemov, Dilian, Daniela Borissova, and Ivan Mustakerov. "Group Decision Making for Selection of Supplier under Public Procurement." In ICT Innovations 2018. Engineering and Life Sciences. ICT 2018. Communications in Computer and Information Science. Vol. 940., 2018.
Borissova, Daniela. "A group decision making model considering experts competency: An application in personnel selections." Comptes rendus de l’Academie Bulgare des Sciences 71, no. 11 (2018): 1520-1527.
Guía Metodológica para la Proyección de Financiación de Capacidades. Vol. v.1.0 . Bogotá, Colombia: Ministerio de Defensa Nacional, 2018.
A Guide to IoT: Security Basics. CSO , 2018.
Board, European Data Prote. Guidelines 3/2018 on the Territorial Scope of the GDPR (Article 3) - Version for Public Consultation. Vol. 19., 2018.
The guidelines on cybersecurity onboard ships In version 3. BIMCO, 2018.
Stubbs, Jack. Hackers Accused of Ties to Russia Hit Three East European Companies: Cybersecurity Firm. Reuters, 2018.
Munro, Ken. Hacking, tracking, stealing and sinking ships. Pen Test Partners, Blog: Maritime Cyber Security, 2018.
Popescu, Nicu, and Stanislav Secrieru. Hacks, Leaks and Disruptions: Russian Cyber Strategies In Chaillot Paper. Paris: European Union, Institute for Security Studies, 2018.
Shalamanov, Velizar. The Hague Talks: Academic Support to Social Networks (Ролята на академичния сектор за защита на кибер пространството от език на омразата и фалшиви новини)., 2018.
Hershtein, Lucas Oro. Ḥākimiyyah 2.0: construyendo un khilāfah virtual In Facultad de Ciencias Sociales y Jurídicas, Instituto de Relaciones Internacionales. Vol. Maestría. Universidad Nacional de La Plata, 2018.
Gupta, Rajneesh. Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain . Packt, 2018.
Matláry, Janne Haaland. Hard Power in Hard Times: Can Europe Act Strategically?. Cham: Palgrave Macmillan, 2018.
Bhunia, Swarup, and Mark Tehranipoor. Hardware Security: A Hands-on Learning Approach. San Francisco, USA: Morgan Kaufmann, 2018.
Health expenditure, public (% of GDP) – Country Ranking. Index Mundi, 2018.
"Here’s How Hostile States Are Hiding behind ‘independent’ Hackers." The Washington Post (2018): 1 February.
Gasimov, Zaur. Historical Dictionary of Azerbaijan. Rowman & Littlefield, 2018.
History of Security Police., 2018.
Homepage of the Bulgarian Military Union “Shipka” ., 2018.
Ciampaglia, Giovanni L., Azadeh Nematzadeh, Filippo Menczer, and Alessandro Flammini. "How Algorithmic Popularity Bias Hinders or Promotes Quality." Scientific reports 8, Article number: 15951, no. 1 (2018).
F.Ryman-Tubb, Nick, Paul Krause, and Wolfgang Garn. "How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark." Engineering Applications of Artificial Intelligence 76 (2018): 130-157.
Ness, Susan, and Peter Chase. How GDPR Could Affect the Transatlantic Relationship. GMF (The German Marshall Fund), 2018.

Pages