Biblio

Export 21402 results:
2019
Zenn, Jacob. "The Islamic State’s Provinces on the Peripheries: Juxtaposing the Pledges from Boko Haram in Nigeria and Abu Sayyaf and Maute Group in the Philippines." Perspectives on Terrorism 13, no. 1 (2019): 87-104.
ISO 27001 Official Page., 2019.
ISO/IEC 27000 Family - Information Security Management Systems. International Organization for Standardization (ISO), 2019.
ISO/IEC/IEEE 42010:2011 – Systems and Software Engineering – Architecture Description., 2019.
ISTR Internet Security Threat Report. Symantec, 2019.
Ivan Geshev: Banev has been secretly communicating with Russian lobbyists from his cage. BTV News, 2019.
Rakonić, Isabella. Kaznenopravni aspekti kibernetičkog ratovanja In Pravni fakultet. Zagreb: Sveučilište u Zagrebu, 2019.
Alusa, Doreen. Kenya’s Changing Counterterrorism Policy: From the Unsecuritization to the Securitization of Terrorism. Vol. Doctor of Philosophy. Murdoch University, 2019.
Frühling, Stephan. "“Key to the defense of the free world”: The past, present and future relevance of NATO for US allies in the Asia–Pacific." Journal of Transatlantic Studies (2019): 1-17.
Siddiqui, Sulaman, Rabia Rasheed, Shahid Nawaz, and Mazhar Abbas. "Knowledge sharing and innovation capabilities: The moderating role of organizational learning." Pakistan Journal of Commerce and Social Sciences (PJCSS) 13, no. 2 (2019): 455-486.
Wirtz, Bernd W., and Jan C. Weyerer. "Künstliche Intelligenz im öffentlichen Sektor: Anwendungen und Herausforderungen." VM Verwaltung & Management 25, no. 1 (2019): 37-44.
Saridal, Lemi Caner. Kurdish Political Identity within the Realm of Turkish Politics and Kemalism In Department of Social and Welfare Studies. Vol. Master. Linköping University, 2019.
Beskow, David M., and Kathleen M. Carley. "La ciberseguridad social: Un ámbito emergente de la seguridad nacional/Social Cybersecurity: An Emerging National Security Requirement." Military Review (2019).
Langhof, Jan Gunter, and Stefan Güldenberg. "Leadership and the significance of formalized organizational structures: Crazy Horse vs Custer." Journal of Management History (2019).
LEAP., 2019.
Ahn, Hyojung, Han-Lim Choi, Minguk Kang, and SungTae Moon. "Learning-Based Anomaly Detection and Monitoring for Swarm Drone Flights." Applied Sciences 9, no. 24 (2019): 5477.
Velev, Toddor, and Nina Dobrinkova. "The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)." Information & Security: An International Journal 43, no. 1 (2019): 113-120.
Lavric, Alexandru. "LoRa (Long-Range) High-Density Sensors for Internet of Things." Journal of Sensors, no. Special Issue (2019): 1-9.
Xu, Weitao, Sanjay Jha, and Wen Hu. "LoRa-Key: Secure Key Generation System for LoRa-Based Network." IEEE Internet of Things Journal 6, no. 4 (2019): 6404-6416.
Lozan Panov as the head of the HCC – four lost years. Legalworld.bg, 2019.
Wlodarczak, Peter. Machine Learning and its Applications. CRC Press, 2019.
Ibrishimova, Marina Danchovsky, and Kin Fun Li. A Machine Learning Approach to Fake News Detection Using Knowledge Verification and Natural Language Processing In Advances in Intelligent Networking and Collaborative Systems. INCoS 2019. Advances in Intelligent Systems and Computing. Vol. 103., 2019.
Tagarev, Todor, and Dimitrina Polimirova. Main considerations in elaborating organizational information security policies In 20th International Conference on Computer Systems and Technologies, CompSysTech 2019. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Colicchia, Claudia, Alessandro Creazza, and David A. Menachof. "Managing Cyber and Information Risks in Supply Chains: Insights from an Exploratory Analysis." Supply Chain Management: An International Journal 24, no. 2 (2019): 215-240.
Papazov, Yavor, George Sharkov, Georgi Koykov, and Christina Todorova. "Managing Cyber Education Environments with Serverless Computing." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.

Pages