Biblio
Export 21406 results:
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare. Vol. Dissertation. Colorado Technical University, 2019.
Extracting Value from NATO Data Sets through Machine Learning and Advanced Data Analytics." In IST-178 specialists meeting on Big data challenges: situational awareness and decision support. Budapest, 2019.
"Facebook F8 2019 Event Recap: All the Announcements that Matter. Pocket-lint, 2019.
Fast Screening of High-Risk Lines under False Data Injection Attacks." IEEE Transactions on Smart Grid 10, no. 4 (2019): 4003-4014.
"A Feature-Based Framework for Structuring Industrial Digital Twins." IEEE Access 8 (2019).
"Forensic Shoe-print Identification: A Brief Survey." arXiv preprint arXiv 1901.01431 (2019).
"A Formal Treatment of Hardware Wallets." IACR Cryptology ePrint Archive (2019): 34.
"Formation and Development of ‘Disaster Resilience Theory’ in Japan." In Depopulation, Deindustrialisation and Disasters, 253-273. Cham: Palgrave Macmillan, 2019.
"Fragile State Index., 2019.
"From Liberal Peacebuilding to Stabilization and Counterterrorism." International Peacekeeping 26, no. 1 (2019).
Future Challenges and Issues in Evolution of the Smart Grid and Recommended Possible Solutions In 2019 IEEE 16th India Council International Conference (INDICON). Rajkot, India, 2019.
Future Digital Society Resilience in the Informational Age. Sofia: SoftTrade, 2019.
The Future of British Foreign Policy: Security and Diplomacy in a World After Brexit. Cambridge, UK: Polity Press, 2019.
The Future of Command and Control Systems." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
"Future Security Challenges and Contemporary Trends in Professional Military Education In Thematic Conference Proceedings of International Significance. Vol. 9., 2019.
Gaining Competitive Advantage in the Gray Zone: Response Options for Coercive Aggression Below the Threshold of Major War. Santa Monica, California: RAND Corporation, 2019.
Game of Threats. How Cybercriminals Use Popular TV Shows to Spread Malware. Kaspersky Lab, 2019.
Game theory, Strategies and the convoluted triangle - India, Pakistan, Kashmir,. Kiel, Hamburg: Leibniz Information Centre for Economics, 2019.
Gas and Reunification in Cyprus: Exploring the Linkages Between the Politics of Natural Gas and the Peace Talks in Cyprus In Conflict Studies & Human Rights. Vol. Master of Arts. Utrecht University, 2019.
The “Gaza Envelope” Communities: A Case Study of Societal Resilience in Israel (2006–2016) In Memorandum. Vol. 188. Tel Aviv: Tel Aviv University, Institute for National Security Studies, 2019.
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security." Information & Security: An International Journal 43, no. 2 (2019): 257-263.
"Generalized Net Model of Cyber-control of the Firm’s Dumpers and Crushers." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
"Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
"