Biblio
Export 21400 results:
Competitive Multilateralism: Adapting Institutions to Meet the New Geopolitical Environment. The Brookings Institution, 2019.
Complementaridade ou Dependência? O Dilema da Armênia Pós-Soviética (Complementarity or Dependence? The Dilemma of the Post-Soviet Armenia)." Revista Conjuntura Global 8, no. 2 (2019): 76-96.
"A comprehensive instrument for identifying critical information infrastructure services." International Journal of Critical Infrastructure Protection 25 (2019): 50-61.
"Computationally intensive functions in designing and operating distributed cyber secure and resilient systems In 20th International Conference on Computer Systems and Technologies, CompSysTech 2019. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Computer Based Methods and Tools for Armed Forces Structure Optimization In ISAT 2018: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018. Vol. 853. Springer, Cham, 2019.
Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
Computer program of social networks content monitoring on cybersecurity - "CyberAggregator" In Certificate of registration of copyright to the work from 31.07.2019. Ukraine, 2019.
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
"Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
Cosco Shipping Port sells port assets to SIPG. Seatrade Maritime, 2019.
The Cost of Cybercrime, 2019., 2019.
Counterintelligence. Latvian State Security Service, 2019.
Counterterrorism. Latvian State Security Service, 2019.
Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study." Connections: The Quarterly Journal 18, no. 1-2 (2019).
"Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
"The Culture of Military School: The Example of the Dr. Franjo Tudjman Croatian Defense Academy." Connections: The Quarterly Journal 18, no. 3 (2019): 45-63.
"A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019 In Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)., 2019.
Cyber Assessment Framework V3.0., 2019.
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019 In Security Report. Check Point Research, 2019.
Cyber Conflict Fact Book: Effect-Creating State-on-State Cyber Operations. Jyväskylä: Cyber Policy Institute, 2019.
Cyber Intelligence Networks: A Typology." International Journal of Intelligence, Security, and Public Affairs 21, no. 1 (2019): 4-24.
"Cyber Preparedness in Maritime Industry." nternational Journal of Scientific and Technical Advancements 5, no. 2 (2019): 19-28.
"