Biblio

Export 21402 results:
2019
Annual Report on the Status of Defense and the Armed Forces . Sofia: Council of Ministers, 2019.
Martino, Steve. Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study In Cisco Benchmark Report., 2019.
Syam, Rajarshi, and R. Marapareddy. Application of deep neural networks in the field of information security and healthcare In 2019 SoutheastCon,., 2019.
Blagoev, Ivan. Application of Time Series Techniques for Random Number Generator Analysis In XXII Int. Conference DCCN . Moscow, Russia, 2019.
Dodonov, Oleksandr, Dmytro Lande, O. Nesterenko, and Boris Berezin. Approach to forecasting the effectiveness of public administration using OSINT technologies: Information technology and security In Proceedings of the XIX International Scientific and Practical Conference ITS-2019. Kyiv: Engineering: , 2019.
Lafaye, Caroline Guibet. Armes et principes. Éthique de l’engagement politique armé., 2019.
Wirtz, Bernd W., Jan C. Weyerer, and Carolin Geyer. "Artificial Intelligence and the Public Sector—Applications and Challenges." International Journal of Public Administration 42, no. 7 (2019).
Svilicic, Boris, Junzo Kamahara, Jasmin Celic, and Johan Bolmsten. "Assessing Ship Cyber Risks: A Framework and Case Study of ECDIS Security." WMU Journal of Maritime Affairs 18, no. 3 (2019): 509-520.
Athanasios, Dagoumas. "Assessing the Impact of Cybersecurity Attacks on Power Systems." Energies 12 (2019).
Аль-Хафаджі, Ахмед Валід, Олександр Олекс Соловйов, Дмитро Дмитр Узун, and Вячеслав Сергі Харченко. "Asset Access Risk Analysis Method in the Physical Protection Systems." Radioelectronic and computer systems 4 (2019).
Bontcheva, Kalina. "Assistive AI Tools for Analysing False Content, Disinformation Flows, and Online Influence Campaigns." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Farrugia, Neil, and Joseph Vella. "Automating Footwear Impressions Retrieval through Texture." Information & Security: An International Journal 43, no. 1 (2019): 73-86.
Gu, Tianyu, Kang Liu, Brendan Dolan-Gavitt, and Siddharth Garg. "Badnets: Evaluating backdooring attacks on deep neural networks." IEEE Access 7 (2019): 47230-47244.
Devlin, Jacob, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. BERT: Pretraining of Deep Bidirectional Transformers for Language Understanding In NAACL-HLT 2019. Minneapolis, Minnesota, 2019.
Ghanizadeh, Afsaneh, and Safoura Jahedizadeh. "“The Best of the Intellect Is a Person’s Knowledge of His Own Self”: Exploring the Psychological Aspects of Imam Reza’s Hadith Using Structural Equation Modeling." Arena of Regulation (2019): 1-18.
The Best Practices in Data Center Design & Installation. Colocation America, 2019.
Mengidis, Notis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities." Information & Security: An International Journal 43, no. 1 (2019): 21-33.
L., Ouyang, Yuan Y., and Wang F.-Y.. "A Blockchain-based Framework for Collaborative Production in Distributed and Social Manufacturing." In IEEE International Conference on Service Operations and Logistics, and Informatics 2019 SOLI 2019. Zhengzhou, China, 2019.
Rahouti, Mohamed. "Board 128: Understanding Global Environment for Network Innovations (GENI) and Software-defined Networking (SDN) for Computer Networking and Security Education." In 2019 ASEE Annual Conference & Exposition. Tampa, Florida, 2019.
A Boole/Shannon Celebration. Massachusetts Institute of Technology, 2019.
Europol. Botnet Taken Down through International Law Enforcement Cooperation., 2019.
Pencheva, Vanina, and Hristina Georgieva. "Bridging the Gap between Research, Innovation and Standardization: The Contribution of BRIDGIT2 Project." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
"Brussels Dispatches an Expert Team to Check on the Cybersecurity in This Country." Mediapool.bg, (2019).
Ivanov, Viktor. Brussels is forcing us - this is the formula of the hybrid war, the gender is just a smoke bomb. 24 Chasa, 2019.
Build an easy RDP Honeypot with Raspberry PI 3 and Observe the Infamous Attacks. Medium.com, 2019.

Pages