Export 20797 results:
Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set." Wireless Communications and Mobile Computing 2021 (2021)."
Research on the evaluation of China’s regional energy security and influencing factors ." Energy Sources, Part B: Economics, Planning, and Policy 16 (2021)."
Research Output of Area Studies Center, for Russia, China and Central Asia, Pakistan; A Bibliometric Analyses of MPhil and PhD Research work of Last Thirty Eight Years." Library Philosophy and Practice (e-journal) 5037 (2021)."
Resilient Development of Models and Methods in Computing Space In 2021 IEEE East-West Design & Test Symposium (EWDTS). Batumi, Georgia, 2021.
The Rhetoric of ‘Speaking in Tongues’ amongst the Mbeere Mau Mau in Colonial Embu." African Journal of Education, Science and Technology 6, no. 4 (2021)."
The role of historical experiences in determining cultural preferences for domestic military deployments in Britain and France In School of Social and Political Sciences, College of Social Sciences . Vol. Doctor of Philosophy in Politics and International Relations. University of Glasgow, 2021.
The Role of Information Campaigns and Advertising in the Military Recruitment System." Information & Security: An International Journal 50, no. 1 (2021): 117-126 ."
Routledge Companion to Global Cyber-Security Strategy. 1st ed. Routledge, 2021.
RSA Weaknesses Caused by the Specifics of Random Number Generation." Information & Security: An International Journal 50, no. 2 (2021): 171-179 ."
Russia’s Energy Strategy and Gas Disputes . E-International Relations, 2021.
Science and Technology Opportunities in Hadith Research." International Journal of Islamic Khazanah 11, no. 1 (2021)."
Securitisation in critical infrastructure identification: from cyber to elections and pandemics In Intelligence and Strategic Studies. Vol. International Master in Security. Glasgow University, 2021.
Securitisation of the 5G rollout in Germany: An analysis ofthe extentto which the 5GrolloutinGermany has been securitised In European Politics and Society (MA). The Netherlands: Universiteit Leiden, 2021.
A Security Approach to a Military Autonomous Platform Path Planning." Information & Security: An International Journal 50, no. 2 (2021): 193-203."
Security of Healthcare Data Using Blockchains: A Survey." arXiv:2103.12326 [cs.CR] (2021)."
Security Theater: A Phenomenological Study of How Individuals Experience Passenger Screening Canines In Department of Doctoral Studies. Vol. Doctor of Computer Science. Colorado Technical University, 2021.
Segurança cibernética e ciberdefesa em Moçambique: fundamentos, características e desafios In Faculdade de ciências econômicas, Programa de pós-graduação em estudos estratégicos internacionais. Maputo: Universidade Federal do Rio Grande do Sul , 2021.
Self-reconnaissance as a preventive tool for organizational information security. Vol. Masteroppgave i samfunnssikkerhet . Universitet i Stavanger , 2021.
A semantic rule based digital fraud detection." PeerJ Computer Science (2021)."
Significant Attacks on Microsoft Exchange ProxyLogon Detected." F-Secure (2021)."
Simulation framework for practical cyber security training in the public service." Security and Defence Quarterly 33 (2021)."
Social Media about the Company's Image as an Element of Specific Development." Preprints (2021)."
Southeast Asia’s raising energy demand Central Asia and the BRI." In China’s Belt and Road Initiative: The Impact on Sub-regional Southeast Asia. 1st Edition ed. Routledge, 2021."
Stability Limits for the Velocity Orientation Autopilot of Rolling Missiles." IEEE Access 9 (2021)."