Biblio
Export 21441 results:
Households’ Experience of Local Government during Recovery from Cyclones in Coastal Bangladesh: Resilience, Equity, and Corruption." Natural Hazards 85, no. 1 (2017): 361-378.
"How Badly Is China’s Great Firewall Hurting the Country’s Economy?" Foreignpolicy (2017).
"How Germany Should Change Its Approach to Arms Control. Carnegie Europe, 2017.
How Is Russia so Dangerous with an Economy Smaller than Canada’s?. PoliticsMeansPolitics.com - PMP Blog!, 2017.
How Israel Caught Russian Hackers Scouring the World for U.S. Secrets." New York Times (2017).
"How Russia Weaponized Social Media in Crimea. Realcleardefense.com, 2017.
How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study. Capella University, 2017.
How to Install Snort NIDS on Ubuntu Linux. Rapid 7 Blog, 2017.
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two Further Validation Studies." Computers and Security 66 (2017): 40-51.
"Hungary’s Alternative to Counter Hybrid Warfare. Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 2017.
Hybrid Multi-Level Credit Card Fraud Detection System by Bagging Multiple Boosted Trees (BMBT)." In IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). Coimbatore, India , 2017.
"Hybrid Threats and Strengthening Resilience on Europe’s Eastern Flank." Security Insights 16 (2017).
"Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
"Hybrid War, Information Technologies and the Legal Vacuum in the Digital World In How Deep is Your Law? Brexit. Technologies. Modern Conflicts, 5th International Conference of PhD Students and Young Researchers. Vilnius, Lithuania: Vilnius University Faculty of Law, 2017.
Hybrid War: The Perfect Enemy In Defence-in-Depth: Research from the Defence Studies Department. London: King’s College, 2017.
Hybrid Warfare – A Form of Asymmetric Conflict In International conference "The Knowledge-Based Organization". Vol. 23., 2017.
Hybrid Warfare in the Baltics: Threats and Potential Responses. Santa Monica, CA: RAND, 2017.
Hybridization of SOM and PSO for Detecting Fraud in Credit Card." Journal of Information Systems in the Service Sector (IJISSS) 9, no. 3 (2017).
"A hypothesis testing-based discussion on the sensitivity of means of fuzzy data with respect to data shape." Fuzzy Sets and Systems 328 (2017): 54-69.
"The Image of Security Sector Agencies as a Strategic Communication Tool." Connections: The Quarterly Journal 16, no. 3 (2017): 5-22.
"Implementasi Pendidikan Karakter Melalui Kegiatan Keagamaan Di Mts Muhammadiyah Purwokerto. Universitas Muhammadiyah Purwokerto, 2017.
Implementation of a Process Approach to Information Security Risk Management in Documents NIST P-ISSN 2411-1031." Information Technology and Security 2, no. 9 (2017): 76-89.
"On improvement of the measures to ensure protection of critical infrastructure objects (in Ukrainian) In Decree of President of Ukraine., 2017.
Improving the Reliability of the Values of the Significance of Criteria in Determining the Market Value of Real Estate Objects." Upravlinnia rozvytkom skladnykh system 29 (2017): 109-118.
"