Biblio
Export 21402 results:
Metod ocinjuvannja oznak zagroz informacijnij bezpeci derzhavy u socialnyh internet-servisah." Avtomatyzacija tehnologichnyh i biznes-procesiv 9 (2017): 36-42.
"Metod pobudovy profiliv informacijnoi bezpeky aktoriv socialnyh internet-servisiv." Informacijna bezpeka 1, no. 25 (2017): 104-110.
"Metod vyjavlennja oznak informacijnyh vplyviv u socialnyh internet-servisah za zmistovnymy oznakamy." Radioelektronika, informatyka, upravlinnja 2, no. 41 (2017): 117-126.
"Métodos Eficientes de Simulação e Otimização em Problemas de Segurança Portuária In Faculdade de Ciências (FC) Departamento de Informática / Department of Informatics (FC-DI) FC. Vol. Teses de Doutoramento . Universidade de Lisboa, 2017.
The Metric at the End of the Rainbow In The TIEMS USA 2017 Annual Conference Emergency Management, Homeland Security, and Computing., 2017.
Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research." International Journal On Advances in Security 10, no. 1&2 (2017): 114-125.
"Microsoft Is Right: We Need A Digital Geneva Convention In Opinion., 2017.
Migrants, Housewives, Warriors or Sex Slaves: AQ’s and the Islamic State’s Perspectives on Women." Connections: The Quarterly Journal 16, no. 1 (2017): 99-111.
"Migration and remittances: the rise and fall of Albania and Kosovo in." In Migration Waves in Eastern Europe [1990-2015], 305-316. European Trade Union Institute (ETUI) (Hrsg.), Auflage, 2017.
"Migration, Terrorism and the Future of a Divided Europe: A Continent Transformed. Santa Barbara, CA: Praeger Security International, 2017.
Military Alliance and Counter-Terrorism in Sub-Saharan Africa: The Multi-National Joint Task Force in Perspective." Covenant University Journal of Politics & International Affair 5, no. 2 (2017): 1-12.
"Military Personnel., 2017.
Military Professionalization Programs in Kazakhstan and the United States: How to Implement and What Will We Gain?" Connections: The Quarterly Journal 16, no. 2 (2017): 91-104.
"A model of a Private Sector Organisation's Intention to Adopt Cloud Computing in the Kingdom of Saudi Arabia In Faculty of Physical Sciences And Engineering Department of Electronics and Computer Science. Vol. Doctor of Philosophy in Computer Science. University of Southampton, 2017.
Model systemy pidtrymky pryjnjattja rishen dlja vyjavlennja oznak zagroz informacijnij bezpeci derzhavy u socialnyh internet-servisah ta ocinjuvannja ih rivnja." Bezpeka informacii 23, no. 2 (2017): 136-144.
"Modeling a Managed Communication Environment In Jubilee Scientific Conference with International Participation “Modern Aviation Training Trends”. D. Mitropolia, 2017.
Modeling of a managed communication environment In Jubilee scientific conference with international participation "Contemporary trends in aviation training". D. Mitropolia, 2017.
Modelling a Managed Communication Environment In Anniversary Scientific Conference “Modern Aviation Training Trends. Dolna Mitropolia, Bulgaria, 2017.
Modelling & Deployment of Data Protection Component of Information Security Systems In First International Interdisciplinary Conference on Information and Cyber Security-Global, ICICSG’2017. Istanbul, 2017.
Models and Methods in Creative Computing: Diversity and Type-Variety Principle in Development of Innovation Solutions." In 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC). Exeter, UK , 2017.
" The Mole and the Mallet: Islamic State and al-Qaeda in the ‘Thirty Years' War’ in the Middle East." Connections: The Quarterly Journal 16, no. 1 (2017): 7-24.
"Montenegro Accuses Russia of Masterminding Coup Attempt. Fox News, 2017.
Montenegro’s Accession to NATO is ‘One of the Biggest Betrayals in History’. Sputnik News, 2017.
Montenegro ‘to Indict Russian Spy Behind Coup Plot’." The Telegraph (2017).
"