Biblio

Export 21408 results:
2019
Lozan Panov as the head of the HCC – four lost years. Legalworld.bg, 2019.
Wlodarczak, Peter. Machine Learning and its Applications. CRC Press, 2019.
Ibrishimova, Marina Danchovsky, and Kin Fun Li. A Machine Learning Approach to Fake News Detection Using Knowledge Verification and Natural Language Processing In Advances in Intelligent Networking and Collaborative Systems. INCoS 2019. Advances in Intelligent Systems and Computing. Vol. 103., 2019.
Tagarev, Todor, and Dimitrina Polimirova. Main considerations in elaborating organizational information security policies In 20th International Conference on Computer Systems and Technologies, CompSysTech 2019. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Colicchia, Claudia, Alessandro Creazza, and David A. Menachof. "Managing Cyber and Information Risks in Supply Chains: Insights from an Exploratory Analysis." Supply Chain Management: An International Journal 24, no. 2 (2019): 215-240.
Papazov, Yavor, George Sharkov, Georgi Koykov, and Christina Todorova. "Managing Cyber Education Environments with Serverless Computing." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Iorga, Michaela. Managing Risk in the Cloud. National Institute of Standards and Technology, 2019.
Damanik, Yenglis Dongche, Amarulla Octavian, and Pujo Widodo. "Manajemen penggelaran kekuatan tentara nasional indonesia pada pembentukan Komando Armada III Sorong dalam menghadapi potensi ancaman di wilayah perbatasan Indonesia Timur." Manajemen Pertahanan 5, no. 2 (2019): 1-21.
Bergh, Arild. Massage the message: Modularising software for influence operation detection in social media., 2019.
Nikolić, Dejan Ž., Mitar Kovač, and Vlada M. Mitić. "Menadžment u odbrani - osnovne funkcije." Vojno delo 71, no. 1 (2019): 99-126.
Nikolic, Nebojsa. "Mesto Zapadnog Balkana u agendama Rusije i Turske u kontekstu hibridnih pretnji." Vojno delo 71, no. 7 (2019): 289-305.
Campedelli, Gian Maria. On Meta-Networks, Deep Learning, Time and Jihadism. Vol. Doctor of Philosophy in Criminology. Università Cattolica del Sacro Cuore di Milano, 2019.
Drozd, Oleksandr, Viktor Antoniuk, Svetlana Antoshchuk, and Myroslav Drozd. "A Method of Common Signal Monitoring in FPGA-Based Components of Safety-Related Systems." In CMIS, 2019., 2019.
Shalamanov, Velizar, and Georgi Penchev. "Methodology for Organizational Design of Cyber Research Networks." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Barybin, Oleksii. "Methodology of Testing for the Penetration of the Website of a Higher Education Institute." Standartyzatsiia, sertyfikatsiia, yakist. Systemy upravlinnia 4, no. 116 (2019): 12-18.
MGERB 10th Winter University Declaration: Destroying humanitarian aid is a crime against humanity. Focus-news.net, 2019.
Streif, Rudolf. Microcontroller versus System-on-Chip in Embedded System Designs. CTO - ibeeto, 2019.
Migration and Home Affairs. Information exchange, European Commission, 2019.
Militārās izlūkošanas un drošības dienests (MIDD)., 2019.
Russell, Matthew. Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram. O’Reilly Media, 2019.
O’Connor, Cailin, and James Owen Weatherall. The Misinformation Age: How False Beliefs Spread. New Haven, CT: Yale University Press, 2019.
Videv, Tihomir, Boris Bozveliev, and Sotir Sotirov. "Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation." Information & Security: An International Journal 43, no. 1 (2019): 45-53.
Gaydarski, Ivan, and Zlatogor Minchev. Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019.
Prav, Roman. "Monitoring of the development of information infrastructure in Ukraine." Technology audit and production reserves 3/4, no. 47 (2019): 12-18.
Dudykevych, Valeriy, Ivan Prokopyshyn, Vasyl Chekurin, Ivan Opirskyy, Yuriy Lakh, Taras Kret, Yevheniia Ivanchenko, and Ihor Ivanchenko. "A Multicriterial Analysis of the Efficiency of Conservative Information Security Systems." Eastern-European Journal of Enterprise Technologies 3, no. 9(99) (2019): 6-13.

Pages