Biblio
Export 21402 results:
Managing Risk in the Cloud. National Institute of Standards and Technology, 2019.
Manajemen penggelaran kekuatan tentara nasional indonesia pada pembentukan Komando Armada III Sorong dalam menghadapi potensi ancaman di wilayah perbatasan Indonesia Timur." Manajemen Pertahanan 5, no. 2 (2019): 1-21.
"Massage the message: Modularising software for influence operation detection in social media., 2019.
Menadžment u odbrani - osnovne funkcije." Vojno delo 71, no. 1 (2019): 99-126.
"Mesto Zapadnog Balkana u agendama Rusije i Turske u kontekstu hibridnih pretnji." Vojno delo 71, no. 7 (2019): 289-305.
"On Meta-Networks, Deep Learning, Time and Jihadism. Vol. Doctor of Philosophy in Criminology. Università Cattolica del Sacro Cuore di Milano, 2019.
A Method of Common Signal Monitoring in FPGA-Based Components of Safety-Related Systems." In CMIS, 2019., 2019.
"Methodology for Organizational Design of Cyber Research Networks." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
"Methodology of Testing for the Penetration of the Website of a Higher Education Institute." Standartyzatsiia, sertyfikatsiia, yakist. Systemy upravlinnia 4, no. 116 (2019): 12-18.
"MGERB 10th Winter University Declaration: Destroying humanitarian aid is a crime against humanity. Focus-news.net, 2019.
Microcontroller versus System-on-Chip in Embedded System Designs. CTO - ibeeto, 2019.
Migration and Home Affairs. Information exchange, European Commission, 2019.
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram. O’Reilly Media, 2019.
The Misinformation Age: How False Beliefs Spread. New Haven, CT: Yale University Press, 2019.
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation." Information & Security: An International Journal 43, no. 1 (2019): 45-53.
"Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019.
Monitoring of the development of information infrastructure in Ukraine." Technology audit and production reserves 3/4, no. 47 (2019): 12-18.
"A Multicriterial Analysis of the Efficiency of Conservative Information Security Systems." Eastern-European Journal of Enterprise Technologies 3, no. 9(99) (2019): 6-13.
"The Multi-National Joint Task Force and the G5 Sahel Joint Force: The Limits of Military Capacity-Building Efforts." Contemporary Security Policy 40, no. 4 (2019): 481-501.
"A multi-objective examples generation approach to fool the deep neural networks in the black-box scenario In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)., 2019.
Mythen der Zwei-Prozent-Debatte, Bundesakademie für Sicherheitspolitik." Arbeitspapier Sicherheitspolitik 9 (2019).
" Nation State Cyber Propaganda Operations. Utica College, 2019.
National Resilience, Country Corruption and Quality of Life: An International Study." The International Journal of Social Sciences and Humanities Invention 6, no. 5 (2019): 5430-5436.
"