Biblio

Export 21363 results:
2019
Yosifova, Veneta, and Vesselin Bontchev. "Possible Instant Messaging Malware Attack Using Right-to-Left Unicode Overriding Characters." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Zhou, Z., W. Zhang, Z. Yang, and N. Yu. "Potential risk of IoT device supporting IR remote control." Computer Networks 148, no. 15 (2019): 307-317.
Kikuchi, Masato, and Takao Okubo. Power of Communication Behind Extreme Cybersecurity Incidents In 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress., 2019.
Burrell, Darrell Norman, Ashley Dattola, Maurice E. Dawson, and Calvin Noble. "A Practical Exploration of Cybersecurity Faculty Development With Microteaching." International Journal of Applied Management Theory and Research (IJAMTR) 1, no. 1 (2019).
Amin, Zeinab. "A Practical Road Map for Assessing Cyber Risk." Journal of Risk Research 22, no. 1 (2019): 32-43.
Raikes, Jonathan, Timothy F. Smith, Christine Jacobson, and Claudia Baldwin. "Pre-disaster planning and preparedness for floods and droughts: A systematic review." International Journal of Disaster Risk Reduction 38 (2019).
Lalov, Nikola. President Radev as a hybrid threat. Mediapool.bg, 2019.
Gustafson, Scott, and Hikmat Kashouh. Preventing That Which We Fear: The Church’s Role in Countering Radicalization., 2019.
Dotsenko, Sergiy. "Principle of the total organization of intellectual systems." Radioelectronic and computer systems 1 (2019): 4-16.
Mygal, Valeriy, and Galyna Mygal. "Problems of Digitized Information Flow Analysis: Cognitive Aspects." Information & Security: An International Journal 43, no. 2 (2019): 134-144.
Georgiev, Venelin. "Profiling Human Roles in Cybercrime." Information & Security: An International Journal 43, no. 2 (2019): 145-160.
Shevchenko, Viktor, O.V.Nesterenko, I.E. Netesin, Alina Shevchenko, and V.B. Polishchuk. Prognostic modeling of computer virus epidemics In K.: UkrSC IND., 2019.
Project Description: Internet of Services, Software & virtualization. CORDIS EU Research Results, 2019.
The Promise and Pitfalls of 5G: Will It Kill Cable?. Knowledge@Wharton, 2019.
DeDominicis, Benedict E.. "Propagating the Image with Plausible Deniability: Covert Media Political Campaigns in the Context of Postwar Postmodernity." Global Journal of Business Research 13, no. 1 (2019): 33-69.
Gressel, Gustav. Protecting Europe against Hybrid Threats In Policy Brief. European Council on Foreign Relations, 2019.
Protection of State Secrets. Latvian State Security Service, 2019.
Lee, Y., K. Watanabe, and W.-S. Li. "Public Private Partnership Operational Model – A Conceptual Study on Implementing Scientific-evidence-based Integrated Risk Management at Regional Level. ." Journal of Disaster Research 14, no. 4 (2019): 667-677.
"Public Service Announcement FBI Web Page." (2019).
Helms, Kevin. Putin's Order: Russia to Adopt Crypto Regulation by July. News, 2019.
Chatzichristos, Georgios. "Putting AI into the EU Cyber Crisis Collaboration." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Michael, Sony, Karingada Therisa Kochu, and Baporikar Neeta. Quality Management Implementation in Higher Education: Practices, Models, and Case Studies . IGI Global, 2019.
Niemiec, Marcin, Andrzej Dziech, Miłosz Stypiński, and Jan Derkacz. "Quantum-Based Solutions for the Next-Generation Internet." Information & Security: An International Journal 43, no. 1 (2019): 62-72.
Svilicic, Boris, David Brčić, Srdjan ŽuŁkin, and David Kalebic. "Raising Awareness on Cyber Security of ECDIS." Transnav, the International Journal on Marine Navigation and Safety of Sea Transportation 13, no. 1 (2019).
Easton, Marleen. "Reflections on the Triple-Helix as a Vehicle to Stimulate Innovation in Technology and Security: A Belgian Case Study." In Innovations in Law Enforcement: Implications for Practice, Education and Civil Society, 35-45. Budapest, Hungary: European Union Agency for Law Enforcement Training, CEPOL, 2019.

Pages