Biblio

Export 21376 results:
2016
Mahmud, Mohammad Sultan, Phayung Meesad, and Sunantha Sodsee. "An evaluation of computational intelligence in credit card fraud detection." In International Computer Science and Engineering Conference (ICSEC). Chiang Mai, Thailand , 2016.
Venant, Rémi, Philippe Vidal, and Julien Broisin. "Evaluation of Learner Performance during Practical Activities: an Experimentation in Computer Education." In 16th International Conference on Advanced Learning Technologies (ICALT). Austin, TX, USA: IEEE, 2016.
Amman, Jordan, Sattar J. Aboud, and Mohammad A. Al-Fayoumi. E-voting scheme using bilinear pairing In 7th International Conference on Computer Science and Information Technology (CSIT) (2016) ., 2016.
Alymbaeva, Aida, and Todor Tagarev. The Experience of the Kyrgyz Republic in Crisis Management: Lessons for the Future. Geneva – Bishkek: DCAF, 2016.
Skarga-Bandurova, Inna, Alexandr Ryazantsev, and Katerina Kiryushatova. "An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures." Information & Security: An International Journal 35, no. 2 (2016): 123-132.
Werther, Joseph, Michael Zhivich, Tim Leek, and Nickolai Zeldovich. Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise., 2016.
.Jayasri, K, and P. Seetharamaiah. "An Experimental Safety Analysis using SFMEA for a Small Embedded Computer Control System." International Journal of Innovations in Engineering and Technology (IJIET) 7, no. 3 (2016): 342-351.
Williams, Jon. Exploring Crisis Management in U.S. Small Businesses. Northcentral University, 2016.
Lupilya, Emmanuel C.. Exploring Factors for E-Government Innovation and Transformation in Tanzania In Graduate School of Public Administration . Vol. Ph.D of Public Policy. Seoul National University Public Policy, 2016.
Almendarez, Deborah Lee. Exploring the Use of Texting within San Antonio Texas Police Emergency Reporting. Vol. Dissertation. Walden University, 2016.
Facebook’s 2016 Year in Review. Facebook Newsroom, 2016.
Proszowska, Dominika. "Facing the ‘pivot' to Asia EU's role in East and Southeast Asia from a neorealist perspective." Poliarchia 1, no. 6 (2016): 53-72.
Sowders, Daniel E.. Factors Influencing the Adoption of Intelligence, Surveillance, and Reconnaissance Technology by Collection Managers. Northcentral University, 2016.
Bulman, May. "FBI backs CIA view Russia intervened to help Donald Trump win presidential election." Independent (2016).
Features and Specifications of Distance Education System Moodle In LLC “Open Technologies” - in Russian., 2016.
Federal Law N375-FZ (in Russian)., 2016.
Fifth Chief Information Officers’ Conference,” NATO Communications and Information Agency,. NATO Communications and Information Agency, 2016.
García, D.A. López. "A flexible e-voting scheme for debate tools ." Computers & Security 56 (2016).
García, D.A.López. "A flexible e-voting scheme for debate tools." Computers & Security 56 (2016): 50-62.
García, D. A. López. "A flexible e-Voting scheme for debating tools ." Computers & Security 56 (2016).
Yasko, Alexander, Eugene Babeshko, and Vyacheslav Kharchenko. "FMEDA-Based NPP I&C Systems Safety Assessment: Toward to Minimization of Experts’ Decisions Uncertainty." In 24th International Conference on Nuclear Engineering. Charlotte, North Carolina, USA, 2016.
Saltzman, William R.. "The FOCUS Family Resilience Program: An Innovative Family Intervention for Trauma and Loss." Family Process 55, no. 4 (2016): 647-659.
Fägersten, Björn. For EU Eyes Only? Intelligence and European Security. European Union, Institute for Security Studies, 2016.
Swami, Praveen. For ISIS, Virtual is the Real as It Scouts for India Recruits. The Indian Express, 2016.
Gayathri, C, and R Umarani. "Forecasting Of Automatic Relevance Determination For Feature Selection (FARD-FS) In Financial Fraud Detection." International Journal of Applied Engineering Research (2016).

Pages