Export 21194 results:
Birleşik Krallığın dış politikasında yumuşak güç aracı olarak burs programları. Vol. masterThesis. Batman: Batman Üniversitesi Lisansüstü Eğitim Enstitüsü, 2022.
Blockchain Enabled Artificial Intelligence for Cybersecurity Systems." In Big Data Analytics and Computational Intelligence for Cybersecurity, 165-179. Cham: Springer, 2022."
Blockchain Technologies and Forensic Challenges: Emergent Potential and Diverging Affordances In 17th Pre-ICIS Workshop on Information Security and Privacy. Copenhagen, Denmark, 2022.
Catalog of Human Factor Roles in Cyberspace In IT4Sec Reports., 2022.
Chains, Continuums, and Virtuous Cycles: Parsing Taiwan’s Strategic Narratives and Soft Power Leadership in the Indo-Pacific." Connections: The Quarterly Journal 21, no. 1 (2022): 89-103."
Changing Dimensions of Global Terror in the Twenty-First Century: India’s Strategy and Response." In Nontraditional Security Concerns in India. Singapore: Palgrave Macmillan, 2022."
Cognitive Space for Online and Offline Learning: A Convergent Approach." The Educational Review, USA 6, no. 4 (2022): 109-123."
A Comprehensive Review on the Cyber Security Methods in Indian Organisation." Int. J. Advance Soft Compu. Appl, 14, no. 1 (2022)."
Computer Information Systems and Industrial Management In 21st International Conference CISIM 2022. Barranquilla, Colombia, 2022.
Conceptual model for capability planning in a military context – A systems thinking approach." Systems Engineering (2022): 1-18."
Confronting the Myth of Soft Power in U.S. Foreign Policy. Rowman & Littlefield, 2022.
Consciousness Management by Extremist Organizations With the Means of Internet Communication." Humanities of the South of Russia 11 (54), no. 2 (2022)."
Consolidating cybersecurity in Europe: A case study on job profiles assessment." Computers & Security (2022)."
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment." Information & Security: An International Journal 51, no. 1 (2022): 25-35."
Contemporary Safety Management of Virtual Golf in South Korea." Journal of Sport and Applied Science 6, no. 1 (2022): 01-04."
Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication In Department of Educational Psychology. Vol. Doctor of Philosophy. University of Alberta, 2022.
Critical Information Framework against Cyber-Attacks using Artificial Intelligence and Big Data Analytics In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Greater Noida, India, 2022.
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States." All-Russian Criminological Journal 16, no. 1 (2022): 57-72."
CUS-RF-Based Credit Card Fraud Detection with Imbalanced Data." Journal of Risk Analysis and Crisis Response 12, no. 3 (2022): 110-123 ."
Cyber conflict short of war: a European strategic vacuum ." European Security (2022)."
Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners In 35th International BCS Human-Computer Interaction Conference. Keele: Keele University, 2022.
Cyber Hygiene Issues in the Naval Security Environment." Information & Security: An International Journal 53, no. 2 (2022): 205-218."
Cyber hygiene knowledge, awareness, and behavioral practices of university students." Information Security Journal: A Global Perspective (2022)."
Cyber Persistence Theory: Redefining National Security in Cyberspace. Oxford University Press, 2022.
Cyber Red Teaming: Overview of Sly, an Orchestration Tool." Information & Security: An International Journal 53, no. 2 (2022): 273-286."