Biblio

Export 21402 results:
2020
Rajamäki, Jyri. "Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data." Information & Security: An International Journal 47, no. 1 (2020): 91-108.
Green, Andrew, Amy B. Woszczynski, Kelly Dodson, and Peter Easton. "Responding to Cybersecurity Challenges: Securing Vulnerable US Emergency Alert Systems." Communications of the Association for Information Systems 46 (2020): 187-208.
Lester, Phil, and Sean Moore. "Responding to the Cyber Threat: A UK Military Perspective." Connections: The Quarterly Journal 19, no. 1 (2020): 39-44.
Hassanzadeh, Amin, Amin Rasekh, Stefano Galelli, Mohsen Aghashahi, Riccardo Taormina, Avi Ostfeld, and Katherine M. Banks. "A Review of Cybersecurity Incidents in the Water Sector." Journal of Environmental Engineering 146, no. 5 (2020): 03120003.
Nemčok, Miroslav, and Peter Spáč. "The Rise and Sustainability of Party Leaders in Slovakia: Robert Fico and Mikuláš Dzurinda." In Party Leaders in Eastern Europe. Vol. Palgrave Studies in Political Psychology. Cham : Palgrave Macmillan, 2020.
Boin, Arjen, Louise K. Comfort, and Chris C. Demchak. "The Rise of Resilience." In Designing Resilience: Preparing for Extreme Events, 1-12. Pittsburgh, PA: University of Pittsburgh Press, 2020.
Sliuzas, R.. "Risk Management Planning." In Science for DRM 2020: Acting Today, Protecting Tomorrow (2020).
Sarmiento, J.P., and A.M. Torres-Muñoz. "Risk Transfer for Populations in Precarious Urban Environments." nternational Journal of Disaster Risk Science 2020 11, no. 1 (2020): 74-86.
Tardy, Thierry. "The risks of NATO’s maladaptation." European Security (2020).
Robert G. Brown's General Tools Page., 2020.
Heer, Carsten. Robots help to fight coronavirus worldwide. IFR, 2020.
Rozkazy a směrnice (Orders and Directives) In Ústav pro studium totalitních režimů (Institute for the Study of Totalitarian Regimes)., 2020.
RPi HardwareHistory. RPi Hub, 2020.
Peck, Michael. "Russia’s best strategy for controlling the Black Sea? Divide and conquer." Forbes (2020).
Newman, Lily Hay. Russia’s FireEye Hack Is a Statement—but Not a Catastrophe. Wired, 2020.
Trenin, Dmitri. Russia’s Viral Calculations. Diwan – Middle East Insights from Carnegie, 2020.
Russia 'Used Bulgarian Airspace' To Deliver Military Equipment To Serbia. RFE/RL's Bulgarian, 2020.
Dzebisashvili, Shalva, Suzana Kalashiani, Irakli Gabriadze, Rezo Beradze, and Mirian Ejibia. "Russian Economic Footprint and the Impact on Democratic Institutions in Georgia." Connections: The Quarterly Journal 19, no. 4 (2020): 39-58.
Yildirim, Zafer. "Russia's Role in the Unification Process of Ukraine to EU: Hinderance or Cause?" In Handbook of Research on Social and Economic Development in the European Union, 435-454., 2020.
Nereim, Vivian. Saudi Arabia Looks at ‘Painful Measures,’ Deep Spending Cuts. Bloomberg, 2020.
Duand, Miao, and Kun Wang. "An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things." IEEE Transactions on Industrial Informatics 16, no. 1 (2020): 648-657.
SecureHospitals., 2020.
Antonov, Petar, and Nikoleta Georgieva. "Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
Gupta, Maanak, Mahmoud Abdelsalam, Sajad Khorsandroo, and Sudip Mittal. "Security and Privacy in Smart Farming: Challenges and Opportunities." IEEE Access 8 (2020): 1-21.
Romero, Lyndell D.. Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study. Colorado Technical University, 2020.

Pages