Biblio

Export 21402 results:
2020
Lal, Bechoo. "Case Study: Attacks and Defence Modelling Approach for Cyber Security." International Journal of Business Management and Administration (IJBMA) 1, no. 1 (2020).
Southern, Nathan Paul, and Lindsey Kennedy. "Central Asian States Can’t Hide the Coronavirus Any Longer. Authoritarian States Have Been Downplaying Numbers. That Won’t Last." Foreign Policy (2020).
Chad to stop Participating in Regional fight against Armed Groups. Aljazeera, 2020.
Ivanova, Petya, and Todor Tagarev. "Challenges and Opportunities for Network Intrusion Detection in a Big Data Environment." In DIGILIENCE 2020., 2020.
Ragozini, Giancarlo, and Maria Prosperina Vitale. Challenges in Social Network Research: Methods and Applications: Lecture Notes in Social Network . Springer, 2020.
Maza, Dingji, Umut Koldaş Kangdim, and Sait Aksit. Challenges of Combating Terrorist Financing in the Lake Chad Region: A Case of Boko Haram., 2020.
Burton, Guy. "China and COVID-19 in MENA." POMEPS Studies 39, no. Special Issue on the COVID-19 Pandemic in the Middle East and North Africa (2020).
Pontes, Rúbia Marcussi. A China na grande estratégia dos Estados Unidos da América: da contenção à histórica política de engajamento In Instituto de Filosofia e Ciências Humanas’. Campinas: Universidade Estadual de Campinas, 2020.
Yu, Sun, and Christian Shepherd. "China Struggles with Sharp Rise in Unemployment." Financial Times (2020).
Yunming, Yan. "Chinese Companies Restarting Most Overseas Projects amid COVID-19 Shows BRI Vitality." Global Times (2020).
Babones, Salvatore. "The ‘Chinese Virus’ Spread Along the New Silk Road." Foreign Policy (2020).
CIO.gov., 2020.
Circular polarization. Wikipedia, 2020.
Bertolino, Antonia, Antonello Calabrò, Eda Marchetti, Anton Cervantes Sala, Guiomar Tuñón de Hita, Ilie Daniel Ghe Pop, and Varun Gowtham. "Cloud testing automation: industrial needs and ElasTest response." IET Software 14, no. 5 (2020).
Mygal, Galyna, and Valeriy Mygal. "Cognitive and Ergonomic Aspects Human Interactions with a Computer." Радіоелектронні І Комп’ютерні Системи 1, no. 93 (2020).
Rudd, Kevin. "The Coming Post-COVID Anarchy: The Pandemic Bodes Ill for Both American and Chinese Power – and for the Global Power." Foreign Affairs (2020).
Common Language Security Incident Taxonomy., 2020.
Commission, European. Communication from the Commission on the EU Security Union Strategy. Brussels, 2020.
G. Ramirez-Hernandez, Renée. Community College Software Deployment Success Rate: A Delphi Qualitative Case Study In Information Systems and Technology. Vol. Doctor of Management. University of Phoenix , 2020.
Community Cyber Security Maturity Model (CCSMM). Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio (UTSA), 2020.
Georgieva, Nikoleta. "Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy." Information & Security: An International Journal 46, no. 3 (2020): 311-320.
Competency – a definition. Centranum Group, 2020.
The Competency Framework - A guide for IAEA managers and staff. IAEA, 2020.
Ruoslahti, Harri. "Complexity in project co-creation of knowledge for innovation." Journal of Innovation & Knowledge (2020).
Khouri, Rami G.. "Comprehensive, Contentious, Convulsive, and Continuing: Some Observations on the 2010–2020 Arab Uprisings." Journal of Middle East Politics and Policy (2020).

Pages