Biblio

Export 21376 results:
2018
Yanakiev, Yantsislav, Petko Dimov, and Daniel Bachvarov. "Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare." Information & Security: An International Journal 39, no. 1 (2018): 77-89.
Huang, Li-Chin, and Min-Shiang Hwang. "A Conference Key Scheme Based on the Die-Hellman Key Exchange." International Journal of Network Security 20, no. 6 (2018): 1221-1226.
Dimitrios, Sotiriou. Conflict Resolution and Interethnic Disputes, the 2001 Crisis in FYROM and the Case of the Ochrid Αgreement In Faculty of Social and Political Sciences, Department of Political Studies and International Relations. Vol. Master Program in «Mediterranean Studies». Corinth: University of Peloponnese, 2018.
Nikolic, Nebojsa. "Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings." Information & Security: An International Journal 41 (2018): 21-34.
R., Ziolkowski, Miscione G., and Schwabe G.. "Consensus through Blockchains: Exploring Governance across Inter-organizational Settings." In International Conference on Information Systems 2018, ICIS 2018. San Francisco, CA, , 2018.
Watanabe, Kohei. "Conspiracist propaganda: How Russia promotes anti-establishment sentiment online?" In ECPR General Conference 2018. Hamburg, 2018.
Satija, Siddhant, and Prabhakar Shukla. "Consumer Behaviour and Adoption of M-Commerce." AGU International Journal of Management Studies & Research 6 (2018).
Jackson, Richard, and Daniela Pisoiu. Contemporary Debates on Terrorism. 2nd ed. Routledge, 2018.
Nami, Sanaz, and Mehdi Shajari. "Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors." Expert Systems with Applications 110 (2018): 381-392.
Corera, Gordon. Could Russia and West be Heading for Cyber-war?. BBC News, 2018.
Wardle, Claire, and Hossein Derakhshan. Council of Europe’s Information Disorder Report: Toward an interdisciplinary framework for research and policymaking. 2nd revised edition., 2018.
Monitor, ISIJ. "Countering Hybrid Warfare: Dedicated Organizations and Initiatives." Information & Security: An International Journal 39, no. 3 (2018): 301-304.
Babin, Ivan A., Anton Chablin, Aleksei Kazantsev, Mohammed A. Khesham, Yuri V. Vasiliyev, and Frederic Labarre. "Countering Radicalism in the North Caucasus." Connections: The Quarterly Journal 17, no. 2 (2018): 61-76.
Jopling, Lord. Countering Russia’s Hybrid Threats: An Update In Draft Special Report. NATO Parliamentary Assembly, 2018.
Minchev, Zlatogor, and Mitko Bogdanoski. Countering Terrorist Activities in Cyberspace In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. Vol. 139. IOS Press, 2018.
United Nations General Assembly. Countering the Threat Posed by Improvised Explosive Devices: Report of the Secretary General., 2018.
Country comparison – health expenditure. Index Mundi, 2018.
Andreev, Evgeni, Mariya Nikolova, Veselka Radeva, and Georgi Bochev. Creating Moon Port and Spaceship Simulations in A Virtual Environment In 44th International Conference on Applications of Mathematics in Engineering and Economics AIP . Vol. 2048., 2018.
A Credible Enlargement Perspective for and Enhanced EU Engagement with the Western Balkans. Strasbourg, 2018.
Dal Pozzolo, Andrea, Giacomo Boracchi, Olivier Caelen, Cesare Alippi, and Gianluca Bontempi. "Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy." Transactions on Neural Networks and Learning Systems 29, no. 8 (2018).
Zanin, Massimiliano, Miguel Romance, Santiago Moral, and Regino Criado. "Credit Card Fraud Detection through Parenclitic Network Analysis." Complexity (2018).
Kumari, Anju, Deepti Tamhane, Komal Rani, and Ashwini Walunj. "Credit Card Fraud Detection Using Biometric Fingerprint Authentication." IJSART 4, no. 12 (2018).
Blagoev, Ivan, and Vladimir Monov. "Criteria and Methodology for the Evaluation of e-Learning Management Systems based on the Specific Needs of the Organization." International Journal of Education and Information Technologies 12 (2018): 134-141.
Criteria for assessing the security of information in computer systems from unauthorized access. Ukrainians Government, 2018.
Lemon, Edward. "Critical approaches to security in Central Asia: an introduction." Central Asian Survey 37, no. 1 (2018): 1-12.

Pages