Biblio

Export 21376 results:
2018
The guidelines on cybersecurity onboard ships In version 3. BIMCO, 2018.
Stubbs, Jack. Hackers Accused of Ties to Russia Hit Three East European Companies: Cybersecurity Firm. Reuters, 2018.
Munro, Ken. Hacking, tracking, stealing and sinking ships. Pen Test Partners, Blog: Maritime Cyber Security, 2018.
Popescu, Nicu, and Stanislav Secrieru. Hacks, Leaks and Disruptions: Russian Cyber Strategies In Chaillot Paper. Paris: European Union, Institute for Security Studies, 2018.
Shalamanov, Velizar. The Hague Talks: Academic Support to Social Networks (Ролята на академичния сектор за защита на кибер пространството от език на омразата и фалшиви новини)., 2018.
Hershtein, Lucas Oro. Ḥākimiyyah 2.0: construyendo un khilāfah virtual In Facultad de Ciencias Sociales y Jurídicas, Instituto de Relaciones Internacionales. Vol. Maestría. Universidad Nacional de La Plata, 2018.
Gupta, Rajneesh. Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain . Packt, 2018.
Matláry, Janne Haaland. Hard Power in Hard Times: Can Europe Act Strategically?. Cham: Palgrave Macmillan, 2018.
Bhunia, Swarup, and Mark Tehranipoor. Hardware Security: A Hands-on Learning Approach. San Francisco, USA: Morgan Kaufmann, 2018.
Health expenditure, public (% of GDP) – Country Ranking. Index Mundi, 2018.
"Here’s How Hostile States Are Hiding behind ‘independent’ Hackers." The Washington Post (2018): 1 February.
Gasimov, Zaur. Historical Dictionary of Azerbaijan. Rowman & Littlefield, 2018.
History of Security Police., 2018.
Homepage of the Bulgarian Military Union “Shipka” ., 2018.
Ciampaglia, Giovanni L., Azadeh Nematzadeh, Filippo Menczer, and Alessandro Flammini. "How Algorithmic Popularity Bias Hinders or Promotes Quality." Scientific reports 8, Article number: 15951, no. 1 (2018).
F.Ryman-Tubb, Nick, Paul Krause, and Wolfgang Garn. "How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark." Engineering Applications of Artificial Intelligence 76 (2018): 130-157.
Ness, Susan, and Peter Chase. How GDPR Could Affect the Transatlantic Relationship. GMF (The German Marshall Fund), 2018.
Orenstein, Mitchell A., and Peter Kreko. "How Putin’s Favorite Biker Gang Infiltrated NATO." Foreign Affairs (2018).
Kruzel, John. How Russian Trolls Exploited Parkland Mass Shooting on Social Media. Politifact, 2018.
Monov, Lyubomir, and Maksim Karev. "How to Counter Hybrid Threats?" Information & Security: An International Journal 39, no. 2 (2018): 113-126.
Chuquicusma, Maria, Sarfaraz Hussein, Jeremy Burt, and Ulas Bagci. How to fool radiologists with generative adversarial networks? a visual turing test for lung cancer diagnosis In 2018 IEEE 15th international symposium on biomedical imaging (ISBI 2018)., 2018.
Biden, Jr., Joseph R., and Michael Carpenter. "How to Stand Up to the Kremlin. Defending Democracy Against Its Enemies." Foreign Affairs (2018): 45.
Lemieux, Frederic. How to Tackle Cybersecurity Risks More Effectively. Georgetown University, School of Continuing Studies, 2018.
Mercier, Denis. "How will artificial intelligence and disruptive technologies transform military operations and organizations?" In NATO Science and Technology Organisation conference Bordeaux. Bordeaux: NATO Supreme Allied Commander Transformation, 2018.
Georgiev, Venelin. The Human Factor in Cybersecurity. Sofia: Avangard, 2018.

Pages