Biblio
Export 21402 results:
Advanced Malware Detection with Suricata Lua Scripting. Trustwave, 2017.
Ahrar al-Sham In Mapping Militant Organizations., 2017.
AI will now have input in Air Force decision-making. Defense Systems, 2017.
Algorithm for Controlling Parameters of Linear Filter Based on Fuzzy Expert System." In XIII International Scientific-Technical Conference “Dynamic of Technical Systems” (DTS-2017) ., 2017.
"Alternative distributed ledger technologies Blockchain vs. Tangle vs. Hashgraph-A high-level overview and comparison In Tangle vs. Hashgraph-A High-Level Overview and Comparison., 2017.
"Ambitious Framwork Nation: Germany in NATO. Bundeswehr Capability Planning and the 'Framework Nations Concept'." SWP Comments (German Institute for International and Security Affairs) 35 (2017).
Amri-Sonderermittler klagt über Probleme bei der Akteneinsicht. Der Tagesspiegel online, 2017.
Analisis Pengaruh Kualitas Layanan Publik E-Government (Government to Citizen) Terhadap Penciptaan Public Value (Studi Kasus: Kota Surabaya) In Institut Teknologi Sepuluh Nopember. Vol. Masters thesis., 2017.
Analysis of the Modern Techniques and Methods on Credit Card Fraud Detection." International Journal for Research in Science Engineering and Technology 4, no. 6 (2017).
" Anatomy of Post-Communist European Defense Institutions: The Mirage of Military Modernity. Bloomsbury Academic, 2017.
Anis Amri soll regelmäßig Drogen genommen haben. Welt online, 2017.
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS In Seventh International Symposium on Computing and Networking (CANDAR). Nagasaki, Japan, 2017.
Annotated buzzwords and key references for software testing in the cloud." In International Conference on Computing, Communication and Automation (ICCCA). Greater Noida, India, 2017.
"Annual Report on the Status of Defense and the Armed Forces. Sofia: Council of Ministers, 2017.
Anomaly Detection in Real-Time Gross Settlement Systems In Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017). Vol. 1., 2017.
Anschlag in Berlin – weitere Manipulationen an Akte Amri. Zeit online, 2017.
Application of geoinformation approach to the study of secondary migration of the pollutants from the industrial pollution sources." In 16th EAGE Int. Conf. on Geoinformatics – Theoretical and Applied Aspects., 2017.
"Application of the Method of Analysis of Hierarchies in Solving the Problem of Diversification of the Composition of the Portfolio of Electricity Generation." Visnyk Kyivskoho universytetu, Seriia: Fizyko-matematychni nauky 2 (2017): 123-131.
"Application of UAV Imaging Platform for Vegetation Analysis Based on Spectral-Spatial Methods." Computers and Electronics in Agriculture 140 (2017): 8-24.
"Applied Information Security Assessment Systems. TsP Komprynt, 2017.
An Approach Based on Knowledge Management for the Use of ICTs in Mexican SMEs." IUP Journal of Knowledge Management 15, no. 4 (2017): 7-23.
"Approach to Ensure Protection of Corporate Information Systems in Construction." Upravlinnia rozvytkom sklad¬nykh system 31 (2017): 126-131.
" Arab Multidimensional Poverty Report. United Nations Economic and Social Commission for Western Asia, 2017.