Biblio
Export 21427 results:
The Study of Russo-Baltic Disinformation and Information Manipulation in Contemporary News Media. Vol. MSc International Security, Intelligence and Strategic Studies (SECINTEL). Praha: Univerzita Karlova, 2018.
The subversion of the Bulgarian defence system – the Russian way." Defense & Security Analysis 34 (2018): 15.
" Switzerland and NATO: From Non-Relationship to Cautious Partnership." In The European Neutrals and NATO. New Security Challenges. London: Palgrave Macmillan, 2018.
"Synchronization Verification Improvement of Two Tree Parity Machines Using Polynomial Function In 2018 New Trends in Signal Processing (NTSP). Demanovska Dolina (2018), 2018.
Synthesizing robust adversarial examples In 35th International Conference on Machine Learning, PMLR. Vol. 80. Stockholm, Sweden, 2018.
The System of Hungarian National Cooperation in the Context of the European Union – on Hungary’s EU Integration in a Historical Sociological Approach(link is external)." Analízis (2018): 12-33, quote on p. 23.
"System of Information Systems to support learners (a case study at the University of Technology of Compiègne)." Behaviour & Information Technology 37, no. 10-11 (2018): 1097-1110.
"Sytnik ne smoh predstavit deputatam otchet o dejatelnosti NABU (Сытник не смог представить депутатам отчет о деятельности НАБУ)(link is external). Novoe Vremia, 2018.
Tackling online disinformation: a European Approach(link is external). Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, 2018.
Tackling Online Disinformation: Commission Proposes an EU-wide Code of Practice(link is external). EU Commission, 2018.
Take on Data Science and Machine Learning Tools(link is external). Gartner , 2018.
Targeted Killing as a Counterterrorism Strategy: An Empirical Investigation. University of North Carolina Wilmington, 2018.
Task Forces(link is external)., 2018.
A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System." The International Journal on Marine Navigation and Safety of Sea Transportation 12, no. 3 (2018): 429-437.
"A Taxonomy of Malicious Traffic for Intrusion Detection Systems In 2018 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). Glasgow, UK., 2018.
TechPlomacy(link is external). Office of Denmark's Tech Ambassador, 2018.
Ten Steps to Complex Learning: A Systematic Approach to Four-Component Instructional Design. Third ed. New York: Routledge, 2018.
Terrorists and Cyberspace: The Digital Battleground. Monterey, California: Naval Postgraduate School, 2018.
Tests Document Readability: Readability Calculator(link is external). Online utility.org , 2018.
Theories of Chinese Assertiveness in the South China Sea." In Chinese Assertiveness in the South China Sea. Global Power Shift (Comparative Analysis and Perspectives)., 141-167. Champp: Springer, 2018.
"Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach." ACM Transactions on Cyber-Physical Systems 3, no. 2 (2018): article 18.
"Threat of adversarial attacks on deep learning in computer vision: A survey." IEEE Access 6 (2018): 14410-14430.
"Threats and Vulnerabilities of Cloud Computing: A Review." International Journal of Computer Sciences and Engineering 6, no. 3 (2018).
"