Biblio

Export 21407 results:
2017
Feher, Adrian. Hungary’s Alternative to Counter Hybrid Warfare. Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 2017.
Kavitha, M., and M. Suriakala. "Hybrid Multi-Level Credit Card Fraud Detection System by Bagging Multiple Boosted Trees (BMBT)." In IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). Coimbatore, India , 2017.
Dunay, Pàl, and Ralf Roloff. "Hybrid Threats and Strengthening Resilience on Europe’s Eastern Flank." Security Insights 16 (2017).
Danyk, Yuriy, Tamara Maliarchuk, and Chad Briggs. "Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
Razmetaeva, Yulia. Hybrid War, Information Technologies and the Legal Vacuum in the Digital World In How Deep is Your Law? Brexit. Technologies. Modern Conflicts, 5th International Conference of PhD Students and Young Researchers. Vilnius, Lithuania: Vilnius University Faculty of Law, 2017.
Tuck, Chris. Hybrid War: The Perfect Enemy In Defence-in-Depth: Research from the Defence Studies Department. London: King’s College, 2017.
Herța, Laura-Maria. Hybrid Warfare – A Form of Asymmetric Conflict In International conference "The Knowledge-Based Organization". Vol. 23., 2017.
Radin, Andrew. Hybrid Warfare in the Baltics: Threats and Potential Responses. Santa Monica, CA: RAND, 2017.
Arora, Suman, Guru Jambheshwar, and Dharminder Kumar. "Hybridization of SOM and PSO for Detecting Fraud in Credit Card." Journal of Information Systems in the Service Sector (IJISSS) 9, no. 3 (2017).
Lubiano, María Asunción, Antonia Salas, and María Ángeles Gil. "A hypothesis testing-based discussion on the sensitivity of means of fuzzy data with respect to data shape." Fuzzy Sets and Systems 328 (2017): 54-69.
Lysychkina, Iryna. "The Image of Security Sector Agencies as a Strategic Communication Tool." Connections: The Quarterly Journal 16, no. 3 (2017): 5-22.
Munawaroh, Anida Istiqomah. Implementasi Pendidikan Karakter Melalui Kegiatan Keagamaan Di Mts Muhammadiyah Purwokerto. Universitas Muhammadiyah Purwokerto, 2017.
Kozhedub, Yurii. "Implementation of a Process Approach to Information Security Risk Management in Documents NIST P-ISSN 2411-1031." Information Technology and Security 2, no. 9 (2017): 76-89.
On improvement of the measures to ensure protection of critical infrastructure objects (in Ukrainian) In Decree of President of Ukraine., 2017.
Izmailova, Olha, Sofiia Pyda, Iryna Melnyk, and Kateryna Krasovska. "Improving the Reliability of the Values of the Significance of Criteria in Determining the Market Value of Real Estate Objects." Upravlinnia rozvytkom skladnykh system 29 (2017): 109-118.
In the Ministry of Defence, RF Created Troops for Informational Operations. Interfax, 2017.
Kaura, Vinay. "India’s Counter-Terrorism Policy against Jihadist Terror: Challenges and Prospects." Connections: The Quarterly Journal 16, no. 4 (2017): 51-67.
Kimhi, Shaul. "Individual, Community, and National Resilience in Peace Time and in the Face of Terror: A Longitudinal Study." Journal of Loss and Trauma 22, no. 8 (2017): 698-713.
Industrial Internet of Things Volume G4: Security Framework., 2017.
Keramaris, E., and G. Pechlivanidis. "Influence of permeable bed and channel width on turbulent characteristics in inclined open channel flows." ISH Journal of Hydraulic Engineering 23, no. 2 (2017).
Infographics: Statistics of the Casualties in North Caucasus in the First Quarter of 2017 Based on Caucasian Knot’s Data. Kavkazsky Uzel [Caucasian Knot], 2017.
Sadiku, Matthew N. O., Shumon Alam, and Sarhan M. Musa. "Information Assurance Benefits and Challenges: An Introduction." Information & Security: An International Journal 36 (2017).
Sreenivasan, Sameet, Kevin S. Chan, Ananthram Swami, Gyorgy Korniss, and Boleslaw K. Szymanski. "Information Cascades in Feed-based Networks of Users with Limited Attention." IEEE Transactions on Network Science and Engineering 4, no. 2 (2017): 120-128, .
Kondiloglu, Adil, Harun Bayer, Enes Celik, and Muhammet Atalay. "Information Security Breaches and Precautions on Industry 4.0." Technology Audit and Production Reserves 6, no. 38 (2017): 58-63.
ENISA & ITE. Information Sharing and Analysis Centers (ISACs) Cooperative Models. European Union Agency for Network and Information Security, 2017.

Pages