Biblio

Export 21407 results:
2018
Gaydarski, I., and Zlatogor Minchev. Virtual Enterprise Data Protection: Framework Implementation with Practical Validation In BISEC 2018. Belgrade, Serbia, 2018.
Recher, Elisabetta. The Visegrad Group: an analysis of intelligence cooperation and its challenges In Faculty of Social Sciences. Vol. diploma thesis International Security Studies. Univerzita Karlova, 2018.
Momani, Naill, and Mohamad Alzaghal. "Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan." Information & Security: An International Journal 40, no. 2 (2018): 181-188.
"Voyennaya organizatsiya gosudarstva." In Encyclopedia. Ministerstvo Oborony Rossiyskoy Federatsiyi, 2018.
You, Qiuju, Wei Zhu, Jianchun Zheng, and Shaohu Tang. "Vulnerability Analysis for Urban Natural Gas Pipeline Network System." Information & Security: An International Journal 40, no. 1 (2018): 11-28.
Taghanaki, Saeid Asgari, Arkadeep Das, and Ghassan Hamarneh. "Vulnerability analysis of chest x-ray image classification against adversarial attacks." In Understanding and Interpreting Machine Learning in Medical Image Computing Applications, 87-94. Springer, 2018.
Ojagbule, Olajide, Hayden Wimmer, and Rami J. Haddad. "Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP." In IEEE, SoutheastCon 2018 . St. Petersburg, FL, USA, 2018.
Black, Ryan. "WannaCry, NotPetya, and Cyberwarfare’s Threat to Healthcare." IncideDigitalHealth (2018).
Luber, Stefan, and Peter Schmitz. Was ist Security Awareness?. Security Insider, 2018.
Khaldi, Habiba, Roman Tandlich, Nosiphiwe P. Ngqwala, and Sunitha Srinivas. "The WASH vulnerability of Algeria’s population and analysis of contributing factors." Crisis Management 17, no. 1 (2018): 11-21.
Petrov, Pavel, Stefan Krumovich, Nikola Nikolov, Georgi Dimitrov, and Vladimir Sulov. Web Technologies Used in the Commercial Banks in Finland In 19th International Conference on Computer Systems and Technologies (CompSys-Tech'18). New York, NY, USA, 2018.
Stowell, Joshua. "What is Hybrid Warfare?" Global Security Review (2018).
Hameed, Nafees. "What Makes a Terrorist." New York Review Daily (2018).
Chaw, Lee Y., and Chun Meng Tang. "What makes learning management systems effective for learning?" Journal of Educational Technology Systems 47, no. 2 (2018): 152-169.
Perez, Celestino. "What Military Education Forgets: Strategy is Performance." War on the Rocks (2018).
Khan, Wahaj Ahmed, Syed Tehseen Jawaid, and Imtiaz Arif. "Where does a nation's wealth go? Evidence from a third world country"." Journal of Money Laundering Control (2018).
White Book 2017, The Armed Forces of Ukraine. Ministry of Defence of Ukraine, 2018.
White Book 2017. The Armed Forces of Ukraine . Kyiv: Ministry of Defence of Ukraine, 2018.
Why You Need to Establish a Cyber Security Culture in Within Your Organization. Cytelligence, 2018.
van Uhm, Daan P.. "Wildlife Crime and Security." In Transnational Crime and Global Security. ABC-CLIO, 2018.
van Uhm, Daan. Wildlife Crime and Security, in Transnational Crime and Global Security. ABC-CLIO, 2018.
Coats, Daniel R.. Worldwide Threat Assessment of the US Intelligence Community. Washington D.C: Director of National Intelligence, 2018.
Tredgold, Thomas. "XXXIV. On the Medulus of Elasticity of Air, and the Velocity of Sound." The Philosophical Magazine 52, no. 245 (2018): 214-216.
Rybczyński, Antoni. ’Zielone ludziki’ na Bałtyku? Spektakularna akcja fińskich służb. TVP Info, 2018.
Zimbabwe Demographics Profile 2018. Index Mundi, 2018.

Pages