Biblio
Export 21402 results:
Abschlussbericht des Sonderbeauftragten des Senats für die Aufklärung des Handelns der Berliner Behörden im Fall AMRI. Berlin.de , 2018.
Accountability in the IOT: Systems, Law, and Ways Forward." Computer 51, no. 7 (2018): 54-65.
" Action Plan against Disinformation In High Representative of the Union for Foreign Affairs and Security Policy. Brussels, 2018.
An adaptive system for detecting malicious queries in web attacks." Science China Information Sciences 61 (2018).
"Adoption of E-Government Services in Turkey." AJIT-e: Online Academic Journal of Information Technology 9, no. 32 (2018).
"Adversarial Patch." arXiv e-prints (2018).
"The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank." Connections: The Quarterly Journal 17, no. 2 (2018): 19-35.
"AI Enabled Blockchain Smart Contracts: Cyber Resilient Energy Infrastructure and IoT In 2018 AAAI Spring Symposium Series., 2018.
Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US Department of Homeland Security, 2018.
Alliance C3 Strategy. NATO, 2018.
Analiz na sigurnosta na parolnite frazi In Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni". Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018.
Analysis of Credit Card Fraud Detection Using Fusion Classifiers." In Computational Intelligence in Data Mining, 111-122., 2018.
"Analysis of Cyber-attacks on Smart Grid Applications." In 2018 International Conference on Artificial Intelligence and Data Processing (IDAP). Malatya, Turkey, 2018.
"Analytical Study of Quality-Biased Competition Dynamics for Memes in Social Media." arXiv preprint arXiv:1803.08511 (2018).
"Anatomy of an Online Misinformation Network." PloS One 13, no. 4 (2018).
"Android Devices Ship with Pre-installed Malware. Avast Threat Labs, 2018.
Annual Report on the Status of Defense and the Armed Forces. Sofia: Ministry of Defense, 2018.
Application of Artificial Bee Colony Algorithm for Model Parameter Identification." In Innovative Computing, Optimization and Its Applications, 285-303. Springer, Cham, 2018.
"Application of Information and Communications Technologies and Means of Radio-electronic Warfare in Hybrid War." Information & Security: An International Journal 39, no. 3 (2018): 265-274.
"Application of Mackinder’s Heartland Theory to Past and Present Geopolitical Significance of Central Asia In Perspectives., 2018.
Application of Sustainable Technologies and Internet of Things in the Security and Defense Area In International Scientific Conference "Challenges to the EU and NATO in the context of radicalization, terrorism and migration. Sofia: Military Academy “G.S. Rakovski”, 2018.
Approaches to front-end IoT application development for the ethereumblockchain." Procedia Computer Science 129 (2018): 410-419.
"