Biblio

Export 21402 results:
2019
Dimov, Dimo, and Yuliyan Tsonev. Result oriented time correlation between security and risk assessments, and individual environment compliance framework In International Conference Europe Middle East & North Africa Information Systems and Technologies to Support Learning, Smart Innovation, Systems and Technologies., 2019.
Suryotrisongko, Hatma, and Yasuo Musashi. Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective In IEEE 12th Conference on Service-Oriented Computing and Applications. Kaohsiung, Taiwan, 2019.
Suryotrisongko, Hatma, and Yasuo Musashi. "Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective." In 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA). Kaohsiung, Taiwan, 2019.
Bada, Maria, Basie von Solms, and Ioannis Agrafiotis. "Reviewing National Cybersecurity Awareness for Users and Executives in Africa ." arXiv:1910.01005 12, no. 1-2 (2019).
Poble, Dmytro K.. Rhetoric on Service of Russia’s Information Warfare In Political Communication, Political Discourse and Rhetoric., 2019.
N.M., Scala, Reilly A.C., Goethals P.L., and Cukier M.. "Risk and the Five Hard Problems of Cybersecurity." Risk Analysis 39, no. 10 (2019): 2119-2126.
Risk Management – Risk Assessment Techniques. International Organization for Standardization , IEC 31010:2019., 2019.
Yanakiev, Yantsislav, and Dimitrina Polimirova. "The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Walker, Shaun. "Romanian Hospitals in Crisis as Emigration Takes Its Tall." The Guardian (2019).
Smilov, Daniel. Rumen Radev: a composition based on the picture of Reshetnikov. Deutsche Welle, 2019.
Sarbanes-Oxley Act., 2019.
Satversmes aizsardzības birojs (SAB)., 2019.
Tagarev, Todor, and Nikolai Stoianov. "Scoping the Scenario Space for Multi-sector Cybersecurity Analysis." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Monitor, ISIJ. "Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience” (DIGILIENCE 2020)." Information & Security: An International Journal 43, no. 3 (2019): 397-398.
Paunova, Polina. The secret diary of Tsvetan Tsvetanov. Svobodna Evropa, 2019.
Secure Digital Future 21 Web Page., 2019.
Manoharan, Anto Merline, and Vimalathithan Rathinasabapathy. "Secured Communication for Remote Bio-Medical Monitoring System Using LoRa." Sensor Letters 17, no. 11 (2019): 888-897.
Gawliczek, Piotr. "Security Environment Perceived from Innovative Information/ Communications Technology and Social Media Perspective. Towards System Solutions." In Security and Russian Threats, 251-264. Kielce, Poland: Jan Kochanowski University of Kielce, 2019.
Lemmetty, Soila, and Kaija Collin. "Self-Directed Learning as a Practice of Workplace Learning: Interpretative Repertoires of Self-Directed Learning in ICT Work." Vocations and Learning (2019): 1-24.
Iliev, Rosen. "Sensors and Sensor Systems in Defence." CIO Magazine 7 (2019): 80-84.
Simić, Julija. Serbia in the EU in 2025 – Mission (Im)possible. Euractiv.rs, 2019.
Serbian Anti-govt Protesters Break through Police Cordon & Block Presidential Palace., 2019.
Molstad, Kristine Sommerstad. The Shadow in the Mirror : The Politics and Psychology of the Internalised Double in Chuck Palahniuk’s Fight Club and Jess Walter’s The Zero. Vol. Master's thesis. University of Agder, 2019.
Bikbulatov, Timur, and Ilya Kurochkin. "Simulation of DDoS attack on software defined networks." AIP Conference Proceedings 2181, no. 1 (2019): 020022.
Thomson, Iain. Sinister Secret Backdoor Found in Networking Gear Perfect for Government Espionage: The Chinese are – Oh no, wait, it's Cisco again. The Register, 2019.

Pages