Biblio

Export 21402 results:
2021
Khoroshko, Volodymyr, Zhukov Anatoly, and Latko Iryna. "Research of Processes Occurring with Information Counter-Fighting in Modern Conditions." Scientific and practical cyber security journal (2021).
Cai, Wentian, and Huijun Yao. "Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set." Wireless Communications and Mobile Computing 2021 (2021).
Song, Malin, and Weiliang Tao. "Research on the evaluation of China’s regional energy security and influencing factors ." Energy Sources, Part B: Economics, Planning, and Policy 16 (2021).
Hussain, Abid, Abdus Salam, Muhammad Ibrahim, and Zeeshan Khan. "Research Output of Area Studies Center, for Russia, China and Central Asia, Pakistan; A Bibliometric Analyses of MPhil and PhD Research work of Last Thirty Eight Years." Library Philosophy and Practice (e-journal) 5037 (2021).
McNeil-Willson, Richard. "Resilience against counterterrorism? The repression and response of Crimean Muslim activism against Russian counterterrorism and counter-extremism." Intersections. East european journal of society and politics 7, no. 4 (2021): 154-173.
Drozd, Oleksandr, Andrzej Rucinski, Kostiantyn Zashcholkin, Oleksandr Martynyuk, and Julia Drozd. Resilient Development of Models and Methods in Computing Space In 2021 IEEE East-West Design & Test Symposium (EWDTS). Batumi, Georgia, 2021.
Oktavian, Riskey. "Rezim Keamanan Maritim dalam Penanganan Pembajakan Kapal di Selat Malaka." Jurnal Asia Pacific Studies 5, no. 1 (2021).
Benson, Kanyingi, Mwaruvie John, and Osamba Joshia. "The Rhetoric of ‘Speaking in Tongues’ amongst the Mbeere Mau Mau in Colonial Embu." African Journal of Education, Science and Technology 6, no. 4 (2021).
Harding, Jack. The role of historical experiences in determining cultural preferences for domestic military deployments in Britain and France In School of Social and Political Sciences, College of Social Sciences . Vol. Doctor of Philosophy in Politics and International Relations. University of Glasgow, 2021.
Grigorov, Grigor. "The Role of Information Campaigns and Advertising in the Military Recruitment System." Information & Security: An International Journal 50, no. 1 (2021): 117-126 .
Romaniuk, Scott N., and Mary Manjikian. Routledge Companion to Global Cyber-Security Strategy. 1st ed. Routledge, 2021.
Blagoev, Ivan, Todor Balabanov, and Iliyan Iliev. "RSA Weaknesses Caused by the Specifics of Random Number Generation." Information & Security: An International Journal 50, no. 2 (2021): 171-179 .
Panicker, Lakshmi Priya. Russia’s Energy Strategy and Gas Disputes . E-International Relations, 2021.
Darmalaksana, Wahyudin. "Science and Technology Opportunities in Hadith Research." International Journal of Islamic Khazanah 11, no. 1 (2021).
Ali, Atif, Yasir Khan Jadoon, Muhammad Qasim, Muhammad Shahid Iqbal, Asma, and Muhammad Usama Nazir. Secure Software Development: Infuse Cyber Security to Mitigate Attacks in an Organization In International Conference on Engineering Software for Modern Challenges ESMoC 2021: Engineering Software for Modern Challenges., 2021.
Vinodha, K., Vaishali M. Deshmukh, and Subhashree Rath. Secured Online Learning in COVID-19 Pandemic using Deep Learning Methods In 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC). Tumkur, Karnataka, India, 2021.
Romanova, A.. Securitisation in critical infrastructure identification: from cyber to elections and pandemics In Intelligence and Strategic Studies. Vol. International Master in Security. Glasgow University, 2021.
Schuierer, Nicolas. Securitisation of the 5G rollout in Germany: An analysis ofthe extentto which the 5GrolloutinGermany has been securitised In European Politics and Society (MA). The Netherlands: Universiteit Leiden, 2021.
Ranov, Alexander, and Alexander Kolev. "A Security Approach to a Military Autonomous Platform Path Planning." Information & Security: An International Journal 50, no. 2 (2021): 193-203.
Briggs, Chad, Yuriy Danyk, and Tamara Maliarchuk. "Security Aspects of Hybrid War, COVID-19 Pandemic and Cyber-Social Vulnerabilities." Connections: The Quarterly Journal 20, no. 3 (2021): 47-72.
Pandey, M., R. Agarwal, SK Shukla, and NK Verma. "Security of Healthcare Data Using Blockchains." In Blockchain in Digital Healthcare., 2021.
Pandey, Mayank, Rachit Agarwal, Sandeep K. Shukla, and Nishchal K. Verma. "Security of Healthcare Data Using Blockchains: A Survey." arXiv:2103.12326 [cs.CR] (2021).
Security Program Requirements for IACS Service Providers., 2021.
Petcu, Ioana, Ionuţ Bogdan Candet, Costin Ştefănescu, Cristian Ionel Gruia, and Vlad Craioveanu. "Security Risks of Cloud Computing Services from the New Cybernetics’ Threats Perspective." Romanian Cyber Security Journal 3, no. 1 (2021): 89-97.
Meacham, Lisa. Security Theater: A Phenomenological Study of How Individuals Experience Passenger Screening Canines In Department of Doctoral Studies. Vol. Doctor of Computer Science. Colorado Technical University, 2021.

Pages