Biblio

Export 21402 results:
2019
Malla, Shrijan Bahadur, Shuichi Hasegawa, and Ranjan Kumar Dahal. "Competency of the Infantry Troops of the Nepalese Army in Disaster Response." Journal of Risk Analysis and Crisis Response 9, no. 2 (2019): 62-73.
Jursík, Miroslav, Michaea Kolářová, and Josef Soukup. "Competition, reproduction ability, and control possibilities of conventional and Clearfield® volunteer oilseed rape in winter wheat." Crop Protection (2019): 30-34.
Jones, Bruce, Jeffrey Feltman, and Will Moreland. Competitive Multilateralism: Adapting Institutions to Meet the New Geopolitical Environment. The Brookings Institution, 2019.
de Carvalho, Rodrigo Monteiro. "Complementaridade ou Dependência? O Dilema da Armênia Pós-Soviética (Complementarity or Dependence? The Dilemma of the Post-Soviet Armenia)." Revista Conjuntura Global 8, no. 2 (2019): 76-96.
Herrera, Luis-Carlos, and Olaf Maennel. "A comprehensive instrument for identifying critical information infrastructure services." International Journal of Critical Infrastructure Protection 25 (2019): 50-61.
Tagarev, Todor, and George Sharkov. Computationally intensive functions in designing and operating distributed cyber secure and resilient systems In 20th International Conference on Computer Systems and Technologies, CompSysTech 2019. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In ISAT 2018: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018. Vol. 853. Springer, Cham, 2019.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
Lande, Dmytro, Igor Subach, and Artyom Sobolyev. Computer program of social networks content monitoring on cybersecurity - "CyberAggregator" In Certificate of registration of copyright to the work from 31.07.2019. Ukraine, 2019.
The Constitution Protection Bureau (SAB)., 2019.
Saranov, Nikola. "Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
Larsen, Marie Hjelseth, and Susann Øvretveit. Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
Si, Katherine. Cosco Shipping Port sells port assets to SIPG. Seatrade Maritime, 2019.
CoSoSys Endpoint Protector Web Page., 2019.
Ponemon Institute & Accenture Security. The Cost of Cybercrime, 2019., 2019.
Counterintelligence. Latvian State Security Service, 2019.
Counterterrorism. Latvian State Security Service, 2019.
Ogar, Sarah. Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Jeżewski, Rosław. "Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study." Connections: The Quarterly Journal 18, no. 1-2 (2019).
Turčaník, Michal, and Martin Javurek. "Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
Kozina, Andrija. "The Culture of Military School: The Example of the Dr. Franjo Tudjman Croatian Defense Academy." Connections: The Quarterly Journal 18, no. 3 (2019): 45-63.
Rahouti, Mohamed, and Kaiqi Xiong. A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019 In Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)., 2019.
NCSC. Cyber Assessment Framework V3.0., 2019.
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019 In Security Report. Check Point Research, 2019.
Tikk, Eneken, Kristine Hovhannisyan, Mika Kerttunen, and Mirva Salminen. Cyber Conflict Fact Book: Effect-Creating State-on-State Cyber Operations. Jyväskylä: Cyber Policy Institute, 2019.

Pages