Biblio

Export 21376 results:
2018
Mphago, Banyatsang, Dimane Mpoeleng, Shedden Masupe, and Oteng Tabona. "Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters." Information & Security: An International Journal 40, no. 2 (2018): 189-202.
Bach, Mirjana Pejić, Nikola Vlahović, and Jasmina Pivar. "Self-organizing maps for fraud profiling in leasing." In 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, Croatia , 2018.
Medvedchuk, Oksana. "Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures." Information & Security: An International Journal 40, no. 2 (2018): 129-133.
Shalamanov, Velizar. Service based organisation for security and law enforcement space enabled support., 2018.
Commission, European. Shaping Europe’s Digital Future: Public Private Partnerships., 2018.
Schwab, Klaus, and Nicholas Davis. "Shaping the Future of the Fourth Industrial Revolution." Currency (2018).
Anderson, Eva. Six Red Flags: The Most Frequent Corruption Risks in Ukraine’s Defence Procurement In Transparency International Defence and Security and Trans-parency International Ukraine., 2018.
Kil, A.N.. Small States and Cyber Security: The cases of Estonia, Lithuania, Georgia and Moldova. Vol. Bachelor., 2018.
Samberg, Andre. "Smart Solutions for Sustainable Emergency and Crisis Management." Information & Security: An International Journal 40, no. 1 (2018): 5-8.
Smartphone Factory Resets: The Benefits vs. Limitations. Blancco e-Book, 2018.
Kaya, Mehmet, Jalal Kawash, Suheil Khoury, and Min-Yuh Day. Social Network Based Big Data Analysis and Applications. Springer International Publishing, 2018.
Odunuga, Sesan Adeolu. Soft-Containment and Politics of Relevance. Conceiving a New Dimension of EU-Russia Relations In Scientific Study. GRIN Verlag, 2018.
Afeltowicz, Łukasz, and Krzysztof Pietrowicz. Solutionist interventions and their unforeseen consequences: a preliminary catalogue of often commited errors In 2018 II National Interdisciplinary Scientific Conference TechSpo’18: Power of Algorithms. Krakow, Poland , 2018.
Jordaan, E.. "South African defence policy: the rationale and impact of the SANDF’s primary role and conventional force design ." Defence Studies 18, no. 2 (2018): 188-206.
Yordanova, Gergana. "Sovereign Debt as Emerging Challenge of Hybrid Warfare." Information & Security: An International Journal 39, no. 2 (2018): 183-194.
Speech by Jeremy Wright QC to Chatham House., 2018.
Special Inspector General for Afghanistan Reconstruction. Stabilization: Lessons from the U.S. Experience in Afghanistan. SIGAR, 2018.
Tolubko, Vladimir, O. Kurchenko, and Alina Shevchenko. "Stabilization of the functional stability of the information system by controlling the dynamics of security profiles." Modern Information Security 3 (2018): 51-57.
Guard, National. State Partnership Program., 2018.
"State-sponsored trolling is rampant throughout the world – including the US." MIT Technology Review (2018).
Zaslavskyi, Volodymyr, and Maya Pasichna. Strategic Evaluation of Electricity Generation Structure in the European Union and Ukraine: Geographical Focus In Dependable Systems, Services and Technologies, thesis of conference reports., 2018.
Korkmazyürek, Haluk. Stratejik savunma yönetimi: temel kavramları ve esasları. Hiperyayin, 2018.
Halliday, Alexander. The Study of Russo-Baltic Disinformation and Information Manipulation in Contemporary News Media. Vol. MSc International Security, Intelligence and Strategic Studies (SECINTEL). Praha: Univerzita Karlova, 2018.
Naydenov, Mihail. "The subversion of the Bulgarian defence system – the Russian way." Defense & Security Analysis 34 (2018): 15.
NCSC. Supply Chain Security Guidance., 2018.

Pages