Biblio
Export 21402 results:
Vulnerability analysis of chest x-ray image classification against adversarial attacks." In Understanding and Interpreting Machine Learning in Medical Image Computing Applications, 87-94. Springer, 2018.
"Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP." In IEEE, SoutheastCon 2018 . St. Petersburg, FL, USA, 2018.
"WannaCry, NotPetya, and Cyberwarfare’s Threat to Healthcare." IncideDigitalHealth (2018).
"Was ist Security Awareness?. Security Insider, 2018.
The WASH vulnerability of Algeria’s population and analysis of contributing factors." Crisis Management 17, no. 1 (2018): 11-21.
"Web Technologies Used in the Commercial Banks in Finland In 19th International Conference on Computer Systems and Technologies (CompSys-Tech'18). New York, NY, USA, 2018.
What is Hybrid Warfare?" Global Security Review (2018).
"What Makes a Terrorist." New York Review Daily (2018).
"What makes learning management systems effective for learning?" Journal of Educational Technology Systems 47, no. 2 (2018): 152-169.
"What Military Education Forgets: Strategy is Performance." War on the Rocks (2018).
"Where does a nation's wealth go? Evidence from a third world country"." Journal of Money Laundering Control (2018).
"White Book 2017, The Armed Forces of Ukraine. Ministry of Defence of Ukraine, 2018.
White Book 2017. The Armed Forces of Ukraine . Kyiv: Ministry of Defence of Ukraine, 2018.
Why You Need to Establish a Cyber Security Culture in Within Your Organization. Cytelligence, 2018.
Wildlife Crime and Security." In Transnational Crime and Global Security. ABC-CLIO, 2018.
" Worldwide Threat Assessment of the US Intelligence Community. Washington D.C: Director of National Intelligence, 2018.
XXXIV. On the Medulus of Elasticity of Air, and the Velocity of Sound." The Philosophical Magazine 52, no. 245 (2018): 214-216.
"’Zielone ludziki’ na Bałtyku? Spektakularna akcja fińskich służb. TVP Info, 2018.
Zimbabwe Demographics Profile 2018. Index Mundi, 2018.
"Đukić potpisao osnivanje Prave Crne Gore [Djukic Signed the Founding of True Montenegro]." Pobjeda (2018): 3.
Імітаційна модель поширення продукції психологічного впливу в соціальних мережах." Проблеми створення, випробування, застосування (2018).
"Анализа Система Националне Безбедности Републике Бугарске." Војно Дело 2 (2018).
"Бизнес и сигурност. София: Авангард, 2018.