Biblio
Export 21441 results:
Cyber Threats Analysis In On-Line Social Networks With A Study On User Response In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Cyber Threats to Critical Information Infrastructure." In Cyberterrorism, 123-136. New York, NY, USA: Springer, 2014.
"Cybersäkerhetscentrets Verksamhetsplan 2014–2016. Kommunikationsverket, 2014.
Cybersecurity., 2014.
Cybersecurity and Cyberwar, What Everyone Needs to Know. Oxford University Press, 2014.
Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press, 2014.
Cybersecurity as Realpolitik." In Black Hat USA 2014 Conference., 2014.
"Cybersecurity Considerations for Electrical Distribution Systems In White Paper., 2014.
Cybersecurity in 2015: What to expect? In 2015 Global Megatrends in Cybersecurity. ZDNET, 2014.
Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model In Complimentary Report . Milpitas: FireEye Inc., 2014.
Cybersecurity strategy of Ukraine In draft., 2014.
Cybersecurity's Maginot Line: A Real-world Assessment of the Defense-in-Depth Model In Complimentary Report. Milpitas: FireEye Inc., 2014.
Cyberspace 2025: Navigating the Future of Cybersecurity Policy. Microsoft Corporation, 2014.
Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor & Francis Group, LLC, 2014.
CyberWar, CyberTerror, CyberCrime and CyberActivism: An In-depth Guide to the Role of Standards in the Cybersecurity Environment. IT Governance Publishing, 2014.
Dam-break dry granular flows: experimental and numerical analysis." Wseas Transactions on Environment and Development 10 (2014).
"Data Breaches Put Retail GCs in the Firing Line. New York: Law360, 2014.
Data classification using the Dempster–Shafer method." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517.
"David Delight Plus In Operator's Manual. Canada: Mind Alive Inc., 2014.
De economische effecten van piraterij in Zuidoost-Azië. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014.
Death from Above: Jihadist Virtual Networks Respond to Drone Strikes in Yemen. Jihadica.com, 2014.
Debating European Security and Defense Policy: Understanding the Complexity. Farnham, Burlington: Ashgate Publishing Company, 2014.
De-Conflicting Civil-Military Networks." In Network Topology in Command and Control: Organization, Operation, and Evolution. IGI Global, 2014.
"Deconstructing the Fragile City: Exploring Insecurity, Violence, and Resilience." Environment and Urbanization 26, no. 2 (2014): 345-58.
"