Biblio
Export 21406 results:
Come on!: Capitalism, Short-termism, Population and the Destruction of the Planet In A Report to the Club of Rome . New York, 2019.
Comparative Research of Cybersecurity Information Sharing Models: The Common Cyber Ecosystem of ECHO." In Digital Transformation, Cyber Security and Resilience (DIGILIENCE 2019). Sofia, 2019.
"Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
"Competency of the Infantry Troops of the Nepalese Army in Disaster Response." Journal of Risk Analysis and Crisis Response 9, no. 2 (2019): 62-73.
"Competition, reproduction ability, and control possibilities of conventional and Clearfield® volunteer oilseed rape in winter wheat." Crop Protection (2019): 30-34.
"Competitive Multilateralism: Adapting Institutions to Meet the New Geopolitical Environment. The Brookings Institution, 2019.
Complementaridade ou Dependência? O Dilema da Armênia Pós-Soviética (Complementarity or Dependence? The Dilemma of the Post-Soviet Armenia)." Revista Conjuntura Global 8, no. 2 (2019): 76-96.
"A comprehensive instrument for identifying critical information infrastructure services." International Journal of Critical Infrastructure Protection 25 (2019): 50-61.
"Computationally intensive functions in designing and operating distributed cyber secure and resilient systems In 20th International Conference on Computer Systems and Technologies, CompSysTech 2019. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Computer Based Methods and Tools for Armed Forces Structure Optimization In ISAT 2018: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018. Vol. 853. Springer, Cham, 2019.
Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
Computer program of social networks content monitoring on cybersecurity - "CyberAggregator" In Certificate of registration of copyright to the work from 31.07.2019. Ukraine, 2019.
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
"Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
Cosco Shipping Port sells port assets to SIPG. Seatrade Maritime, 2019.
The Cost of Cybercrime, 2019., 2019.
Counterintelligence. Latvian State Security Service, 2019.
Counterterrorism. Latvian State Security Service, 2019.
Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study." Connections: The Quarterly Journal 18, no. 1-2 (2019).
"Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
"The Culture of Military School: The Example of the Dr. Franjo Tudjman Croatian Defense Academy." Connections: The Quarterly Journal 18, no. 3 (2019): 45-63.
"