Biblio
Export 21400 results:
Living dangerously: securityscapes of Lyuli and LGBT people in urban spaces of Kyrgyzstan." Central Asian Survey 37, no. 1 (2018).
"LoRaWAN specification. LoRa Alliance, 2018.
Machine learning methods for histopathological image analysis." Computational and structural biotechnology journal 16 (2018): 34-42.
"Main Avenues for Hybrid Influence over the National Security System In Hybrid Threats: Myth or Reality? Consequences for the National and the European Security. Sofia: Sofia University “St. Kliment Ohridski, 2018.
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. Future of Humanity Institute – University of Oxford, Centre for the Study of Existential Risk, Center for a New American Security, Electronic Frontier Foundation, Open AI, 2018.
Management Information Systems, Managing Digital Firm,. 15th ed. Harlow, UK: Pearson Education, 2018.
Managerial Strategies Small Businesses Use to Prevent Cybercrime. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2018.
MARINE-EO bridging innovative downstream earth observation and Copernicus enabled services for integrated maritime environment, surveillance, and security In Signal Processing, Sensor/Information Fusion, and Target Recognition XXVII. Vol. 10646. Orlando, Florida, United States, 2018.
Mark Voyger: Russian Hybrid Warfare Can Still Bring Surprises in the Future In interviewing Mark Voyger. Postimees, 2018.
Measuring Crisis Communication Preparedness Across Different Branches of Government – Sharing Experiences Gained in Finland." Online Journal of Communication and Media Technologies 8, no. 1 (2018): 60-69.
"Meet The Russians Behind Your Blockchain (And Cryptocurrency, Too)." Forbes (2018).
"Meeting the Press. NATO Newsroom, 2018.
Meeting the Russian Conventional Challenge. Atlantic Council/Scowcroft Center for Strategy and Security,, 2018.
Method for determining tactical actions . Thales SA, 2018.
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War." Information & Security: An International Journal 41 (2018): 61-79.
"Methodology of Risk Management in Providing Sustainable Development of Settlements." Information & Security: An International Journal 40, no. 1 (2018): 100-104.
"Methods of forming an image of a normal computer behavior Networks In III International Conference "Problems of Decommissioning of Objects nuclear energy and the restoration of the environment," INUDECO. Slavutych, 2018.
Microbial monitoring of surface water in South Africa." International Journal of Environmental Research and Public Health 9, no 8 (2012): 2669-2693 (2018).
"Military Construction Program, FY 2019 Budget. Department of Defense, 2018.
Model Driven Architectural Design of Information Security System." In 14th International Conference on Information Assurance and Security (IAS 2018). Porto, Portugal, 2018.
"A Model of Software Cryptography System for Data Protection in Distribution Information Systems., 2018.
Modeling and Simulation Oriented to the Multi-Military Mission of U.S. Army (美军面向多样化军事任务的建模仿真研究)." Journal of Command And Control 4, no. 2 (2018).
"