Biblio
Export 21398 results:
Cybersecurity in Ukraine: Problems and Perspectives." Information & Security: An International Journal 32, no. 1 (2015): 71-94.
"Cybersecurity Practices for E - Government: An Assessment in Bhutan In The 10 th International Conference on e - Business (iNCEB2015)., 2015.
Cybersecurity Practices for E-Government: An Assessment in Bhutan." In The 10th International Conference on e-Business (iNCEB2015)., 2015.
"Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats." Information & Security: An International Journal 32, no. 2 (2015): 155-174.
"Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem." Medical Devices 8 (2015): 305-316.
"Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
"Data Centre Handbook . USA: John Wiley & Sons, 2015.
Data from a survey presented by the sociologist Boryana Dimitrova at a press conference In called by the member of the European Parliament Svetoslav Malinov., 2015.
De Politiefunctie Geprivatiseerd? Private Beveiliging in België En Nederland." Cahier Politiestudies 3, no. 36 (2015): 11-31.
"Death Row Prisoner Tells of Escape from ISIS Jail." The Times (2015).
"Deaths from Conflict in Northern Ireland by Year and Status In Conflict Archive on the Internet (CAIN). University of Ulster, 2015.
Debt and (not much) deleveraging. McKinsey Global Institute, 2015.
December 2015 Ukraine power grid cyberattack. Wikipedia, 2015.
Deep Learning in Neural Networks: An Overview." Neural Networks 61 (2015): 85-117.
"Deep neural networks are easily fooled: High confidence predictions for unrecognizable images In IEEE Conference on Computer Vision and Pattern Recognition., 2015.
DEEP Ukraine 2015 Programme Review In unclassified internal document. Political Affairs and Security Policy (PASP), 2015.
Defence Companies Anti-Corruption Index (CI) -2015 In TI Defence and Security Programme. London: Transparency International UK, 2015.
Defense expenditures data for 2014 and estimates for 2015: financial and economic data relating to NATO defense In press release., 2015.
Defining ‘Function’. ." In Third International Workshop on Definitions in Ontologies IWOOD 2015. Lisbon, Portugal, 2015.
"Definitions of Organized Crime In collected by Oyster Bay Conferences., 2015.
Dell Secureworks Counter Threat Unit Threat Intelligence In Threat Analysis report. TeslaCrypt Ransomware, 2015.
Democratic Governance Challenges of Cyber Security In DCAF Horizon 2015 Working Paper., 2015.