Biblio

Export 21376 results:
2017
Gheorghe, Adrian V., Dan V. Vamanu, Polinpapilinho F. Katina, and Roland Pulfer. "Critical Infrastructures, Key Resources, and Key Assets." In Critical Infrastructures, Key Resources, Key Assets. Topics in Safety, Risk, Reliability and Quality, 3-37 . Vol. 34. Cham: Springer, 2017.
Markowitz, Lawrence. "The Crystallization of State Security Institutions in Tajikistan and Kyrgyzstan." In 2017 Annual Convention of Association for the Study of Nationalities. New York, NY, 2017.
Ruchansky, Natali, Sungyong Seo, and Yan Liu. CSI: A Hybrid Deep Model for Fake News Detection In 26th ACM International Conference on Information and Knowledge Management (CIKM). Singapore, 2017.
-xu, Shi. "Cultural Discourse Studies scholars as builders of a shared world." Journal of Multicultural Discourses, Special Issue: Multicultural Discourses of ‘Security’ 12, no. 4 (2017): 307-311.
Reid, Judith. "Cultural Foundations of Transparent Governments." Connections: The Quarterly Journal 16, no. 2 (2017): 81-89.
Shalamanov, Velizar. Current and Emerging Regional Threats: Risk assessment and Cooperative approach – View from Bulgaria., 2017.
Shalamanov, Velizar. Current and Emerging Regional Threats: SEE Risk assessment- View from Bulgaria., 2017.
Rohovenko, Oleg, Svitlana Zapara, Nina Melnik, and Ruslana Cramar. "The current status of the local self-government reform in Ukraine: Preliminary conclusions and outlook." Journal of Advanced Research in Law and Economics 8, no. 1 (2017): 178-185.
Buchanan, Ben. Cyber attacks on Ukraine's power grid: to what end?. IISS Cyber security, 2017.
Shalamanov, Velizar. Cyber Defence Stakeholders and respective Governance / Management Structure in NATO context., 2017.
Tucci, Andrew E.. "Cyber Risks in the Marine Transportation System." In Cyber-Physical Security. Protecting Critical Infrastructure, 113-131. Vol. 3. Cham: Springer, 2017.
Mahlyanov, Dobrin, and Nikolai Stoianov. Cyber Security Analysis for Internet of Military Things Models In Scientific Conference with International Participation on Cyber security in the Information Society. Shumen, Bulgaria, 2017.
Tagarev, Todor, George Sharkov, and Nikolai Stoianov. "Cyber Security and Resilience of Modern Societies: A Research Management Architecture." Information & Security: An International Journal 38 (2017): 93-108.
Zelinko, Ilona, Vyacheslav Kharchenko, and Konstantin Leontiev. " Cyber Security Assessment of Component Off-the-Shelf Based NPP I&C System Using IMECA Technique." In 25th International Conference on Nuclear Engineering. Shanghai, China, 2017.
Bada, Maria, Angela Sasse, and Jason Nurse. Cyber Security Awareness Campaigns: Why Do They Fail to Change Behaviour? In the International Conference on Cyber Security for Sustainable Society., 2017.
UK Department for Digital, Culture, Media & Sport. Cyber Security Breaches Survey 2017., 2017.
Pöyhönen, Jouni, and Martti Lehto. Cyber Security Creation as Part of the Management of an Energy Company In 16th European Conference on Cyber Warfare and Security. Dublin, 2017.
EECSP Expert Group. Cyber Security in the Energy Sector In Europe: Energy Expert Cyber Security Platform (EECSP)., 2017.
Kremling, Janine, and Amanda M. Sharp Parker. Cyber space, cyber security, and cyber crime. SAGE Publications, 2017.
Blank, Stephen. "Cyber war and information war a la russe." In Understanding Cyber Conflict: Fourteen Analogies. Georgetown, University Press, 2017.
Baltrusaits, Daniel F.. "Cyber War: Do We Have the Right Mindset?" In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017.
Tabansky, Lior. Cybered Influence Operations: Towards a Scientific Research Agenda In Security Policy Library. The Norwegian Atlantic Comittee, 2017.
Al-Muhtadi, Jalal, Basit Shahzad, Kashif Saleem, Wasif Jameel, and Mehmet A. Orgun. "Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment." Health Informatics Journal 10, no. 22 (2017).
Al-Muhtadi, Jalal, Basit Shahzad, Kashif Saleem, Wasif Jameel, and Mehmet A. Orgun. "Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment ." Health Informatics Journal (2017).
S Blanco, Moran. Cybersecurity and the Use of Information and Communication Technologies (ICT) for Terrorism . REDI, 2017.

Pages