Export 21123 results:
Conceptual model for capability planning in a military context – A systems thinking approach." Systems Engineering (2022): 1-18."
Confronting the Myth of Soft Power in U.S. Foreign Policy. Rowman & Littlefield, 2022.
Consciousness Management by Extremist Organizations With the Means of Internet Communication." Humanities of the South of Russia 11 (54), no. 2 (2022)."
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment." Information & Security: An International Journal 51, no. 1 (2022): 25-35."
Contemporary Safety Management of Virtual Golf in South Korea." Journal of Sport and Applied Science 6, no. 1 (2022): 01-04."
Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication In Department of Educational Psychology. Vol. Doctor of Philosophy. University of Alberta, 2022.
Critical Information Framework against Cyber-Attacks using Artificial Intelligence and Big Data Analytics In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Greater Noida, India, 2022.
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States." All-Russian Criminological Journal 16, no. 1 (2022): 57-72."
CUS-RF-Based Credit Card Fraud Detection with Imbalanced Data." Journal of Risk Analysis and Crisis Response 12, no. 3 (2022): 110-123 ."
Cyber conflict short of war: a European strategic vacuum ." European Security (2022)."
Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners In 35th International BCS Human-Computer Interaction Conference. Keele: Keele University, 2022.
Cyber Hygiene Issues in the Naval Security Environment." Information & Security: An International Journal 53, no. 2 (2022): 205-218."
Cyber hygiene knowledge, awareness, and behavioral practices of university students." Information Security Journal: A Global Perspective (2022)."
Cyber Persistence Theory: Redefining National Security in Cyberspace. Oxford University Press, 2022.
Cyber Red Teaming: Overview of Sly, an Orchestration Tool." Information & Security: An International Journal 53, no. 2 (2022): 273-286."
Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard In IT4Sec Reports., 2022.
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends." Information 13, no. 22 (2022)."
Cybersecurity Awareness Modeling Associated with Influential Factors Using AHP Technique: A Case of Railway Organizations in Thailand." In 2022 International Conference on Decision Aid Sciences and Applications (DASA). Chiangrai, Thailand, 2022."
Cybersecurity Practices for Social Media Users: A Systematic Literature Review ." Journal of Cybersecurity and Privacy 2 (2022): 1-18."
Defense Diplomacy Strategy in Handling Transnational Crimes at the Sea Borders of Indonesia – Malaysia – Filipina ." International Journal of Social Science And Human Research 05, no. 02 (2022)."
On the Design of Educational Course of Action Wargaming." Developments in Business Simulation and Experiential Learning 49 (2022)."
Desired Cybersecurity Skills and Skills Acquisition Methods in the Organizations In 21st European Conference on Cyber Warfare and Security., 2022.
Detecting One-Pixel Attacks Using Variational Autoencoders." In World Conference on Information Systems and Technologies WorldCIST 2022 ., 2022."
The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia." Budapest International Research and Critics Institute-Journal (BIRCI-Journal) 5, no. 3 (2022): 22859-22872."