Biblio

Export 21120 results:
2022
Karakuş, Muhammed, and Ömer Ak. "Pornification of the Cyberspace during intrastate conflicts: VNSAs, recruitment strategies and the changing role of women in the turbulence of violence." In Fighting for Empowerment in an Age of Violence. IGI Global , 2022.
Matey, Akwetey Henry, Paul Danquah, and Godfred Yaw Koi-Akrofi. "Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)." (IJACSA) International Journal of Advanced Computer Science and Applications 13, no. 1 (2022).
Creekmore, Jonathan. A Predictive Study on Acceptance of Honeypots in U.S. Cybersecurity Professionals In School of Business, Technology, and Health Care Administration. Vol. Doctor of Philosophy. Capella University, 2022.
Hoyte, Trudee, Anil Ali, and Adilah Mahabir. "A Preliminary Study Investigating the Impact of the COVID-19 Pandemic on Dental Education in the Caribbean: A Student’s Perspective." Oral 2 (2022): 251-262.
Jurgała, Piotr, Tytus Kurek, and Marcin Niemiec. "Preserving Privacy of Security Services in the SecaaS Model." Information & Security: An International Journal 53, no. 1 (2022): 47-64 .
Tarchia, Livio, Pietro Crescenzo, and Kristian Talamonti. "Prevalence and predictors of mental distress among Italian Red Cross auxiliary corps: A cross-sectional evaluation after deployment in anti-COVID-19 operations." Military Psychology (2022).
Farheen, Meraj, Pawankumar Sharma, and Bibhu Dash. "Prevention of Phishing Attacks Using AI-Based Cybersecurity Awareness Training." International Journal of Smart Sensor and Adhoc Network 3, no. 3 (2022): 61-72.
Ho, Yick Oi Janet. Principles of Management in the Dao De Jing: A Grounded Theory Analysis in Light of Maharishi Vedic Science In Graduate School . Vol. Ph.D. Maharishi International University, 2022.
Mygal, Valeriy, Galyna Mygal, and Stanislav Mygal. "Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor." Information & Security: An International Journal 53, no. 2 (2022): 240-252.
Georgiev, Venelin. Productive and Counter-Productive Balance in Security In CSDM Views., 2022.
Spasic, A. J., D. S. Jankovic, P. J. Rajkovic, and D. S. Aleksic. "Programme-Sensitive Modifications of Generalized Net Model of Software-Intensive Production of Stereoscopic Multimedia Content." Journal of Computer and Systems Sciences International 61 (2022): 824-842.
Latvala, Outi–Marja, Ivo Emanuilov, Tatu Niskanen, Pia Raitio, Jarno Salonen, Diogo Santos, and Katerina Yordanova. Proof-of-Concept for a Granular Incident Management Information Sharing Scheme In 2022 IEEE World AI IoT Congress (AIIoT). Seattle, WA, USA, 2022.
Kachev, Ognyan. "Providing Physical Protection of the Vessel in the Event of an Attack at Sea and Ports." Information & Security: An International Journal 51 (2022): 73-78.
Turlubekova, Zhaniya. "Pushed against the Wall: The Fight against Drug-Related Corruption in Kazakhstan." Communist and Post-Communist Studies 55, no. 3 (2022): 119-139.
Stefanova, Marieta. "Quality Management Costs in Logistics." In Quality Control., 2022.
Bridge, James. A Quantitative Study of the Relationship of Data Quality Dimensions and User Satisfaction with Cyber Threat Intelligence. Capella University, 2022.
Chen, Liao, Ning Jia, Hongke Zhao, Yanzhe Kang, Jiang Deng, and Shoufeng Ma. "Refined analysis and a hierarchical multi-task learning approach for loan fraud detection." Journal of Management Science and Engineering (2022).
Stucki, Max. Refleksiivinen Kontrolli: Systemaattinen Kirjallisuuskatsaus In Informaatioteknologian Tiedekunta. Jyväskylän Yliopisto, 2022.
Caison, Shawn. The Relationship between Consumer Awareness of Information Security, Age, and Internet of Things Product Acquisitions In School of Business, Technology, and Health Care Administration. Vol. Doctor of Philosophy. Capella University, 2022.
Angeli, Franco. Relazioni sociali e crimine organizzato : il caso di una rete ‘ndranghetista., 2022.
Pokojski, Zenon, Agnieszka Kister, and Marcin Lipowski. "Remote Work Efficiency from the Employers’ Perspective—What’s Next? ." Sustainability 14 (2022).
Yang, Peijie, Lusheng Jia, Zhuang Kang, and Jichuan Kang. "Research on risk assessment method of steel catenary riser based on information fusion." Ocean Engineering 259,, no. 1 (2022).
Mao, Xiaodong, and Fei Xu. "Research on the Popularity Prediction of Multimedia Network Information Based on Fast K Neighbor Algorithm." Journal of Electrical and Computer Engineering, 2022 (2022).
Chabani, Zakariya, and Widad Chabani. "The Role of Blockchain Technology in Enhancing Security Management in the Supply Chain." In Advances in Blockchain Technology for Cyber Physical Systems. Springer Nature, 2022.
Matejić, Ivica, and Mihailo Ćurčić. "The Role of Electronic Payments in Money Laundering." In Security Challenges of Modern Society: Dilemmas and implications. Niš, Beograd, Banja Luka: University „Union-Nikola Tesla“,Belgrade Institute for Humanities and Social Research, Independent University of Banja Luka, 2022.

Pages