Biblio
Export 21402 results:
Modelling Activity of a Malicious User in Computer Networks." Cybernetics and Information Technologies 22, no. 2 (2022).
"Money Laundering and Terrorist Financing through Cryptocurrency. Vol. Master of Science in Financial Crimes and Compliance Management. Utica University, 2022.
Most Attractive Scenic Sites of the Bulgarian Black Sea Coast: Characterization and Sensitivity to Natural and Human Factors." Land 11, no. 7 (2022).
"Multilateralizm w promowaniu relacji bilateralnych: polityka Chińskiej Republiki Ludowej wobec Bułgarii, Rumunii oraz Serbii w formacie 17+1 In Katedra Studiów Azjatyckich. Vol. doktor. Uniwersytet Łódzki, 2022.
Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities In International Conference on Multimedia Communications, Services and Security, MCSS 2022: Multimedia Communications, Services and Security . Vol. 1689. Cham: Springer, 2022.
The Narration of Russia through Public Diplomacy: A Case Study of Russia-Japan Relations. Vol. Doctor of Philosophy in Social Sciences. University of Tsukuba, 2022.
NATO and Intermediate Force Capabilities: Why Human Effects Matter." Connections: The Quarterly Journal 21, no. 2 (2022): 123-134.
"NATO and the Impact of the Long War in Afghanistan: Avoiding a Wrong Memory About ISAF." In NATO in the Post-Cold War Era. Palgrave Macmillan, Cham, 2022.
"ndependent School Districts in Texas: A Focused Ethnography on Cybersecurity Barriers In School of Business. Vol. Doctor of business administration., 2022.
Neither External nor Multilateral: States’ Digital Diplomacy During Covid-19." Journal of Public Diplomacy 2, no. 1 (2022): 69-96.
"Neo-Authoritarianism and Leadership: Outcomes for Modern Ukraine." Connections: The Quarterly Journal 21, no. 1 (2022): 105-120.
"Net-zero emissions: main technological, geopolitical, and economic consequences of the new energy scenario." SSRN (2022).
"The New Challenges of Romania’s Cyber Security Policy." Romanian Cyber Security Journa 1, no. 4 (2022).
"Nonlethal Weapons and Intermediate Force: A Necessary Complement to Lethality." Connections: The Quarterly Journal 21, no. 2 (2022): 55-66.
"A Novel Approach for Analysing and Predicting the Online Money Transactions Using Machine Learning Auto Encoders." Journal of Engineering Sciences 13 (2022).
"Occupancy grid environmental modeling for automotive applications In Automatics, Computer Science and Biomedical Engineering Department of Automatic Control and Robotics . Vol. Doctoral Dissertation. Kraków : AGH University of Science and Technology Faculty of Electrical Engineering, 2022.
The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act." arXiv preprint arXiv:2205.13196 (2022).
"The opportunity to regulate cybersecurity in the EU (and the world): recommendations for the Cybersecurity Resilience Act." arXiv.org (2022).
"OSINT on the Dark Web: Child Abuse Material Investigations." Information & Security: An International Journal 53, no. 1 (2022): 21-32.
"Pandemic and Beyond: Domestic Call-Out Operations of the Philippine Military." In Military Operation and Engagement in the Domestic Jurisdiction, 334-371., 2022.
"Pant Leg Pedagogy: Context and Conflict at Tafsīr Islamic Academy." Pedagogy, Culture & Society (2022).
"Parliaments’ Contributions to Security Sector Governance/ Reform and the Sustainable Development Goals: Testing Parliaments’ Resolve in Security Sector Governance During Covid-19 In SSR Papers. Vol. 21. Geneva: Geneva Centre for Security Sector Governance, 2022.
PBX Hacking In DEVOPEDIA ® for developers., 2022.
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach." Information & Security: An International Journal 53, no. 2 (2022): 177-190.
"Piloting the ECHO e-Skills and Training Toolkit." Information & Security: An International Journal 53, no. 2 (2022): 163-175.
"