Biblio

Export 21407 results:
2022
Bhatia, Deepshikha. "A Comprehensive Review on the Cyber Security Methods in Indian Organisation." Int. J. Advance Soft Compu. Appl, 14, no. 1 (2022).
Saeed, Khalid, and Jiří Dvorský. Computer Information Systems and Industrial Management In 21st International Conference CISIM 2022. Barranquilla, Colombia, 2022.
Koivisto, Jouni, Risto Ritala, and Matti Vilkko. "Conceptual model for capability planning in a military context – A systems thinking approach." Systems Engineering (2022): 1-18.
Lawniczak, Brent A.. Confronting the Myth of Soft Power in U.S. Foreign Policy. Rowman & Littlefield, 2022.
Lukichev, P. N., and A. A. Ali. "Consciousness Management by Extremist Organizations With the Means of Internet Communication." Humanities of the South of Russia 11 (54), no. 2 (2022).
Budde, Carlos E., Anni Karinsalo, Silvia Vidor, Jarno Salonen, and Fabio Massacci. "Consolidating cybersecurity in Europe: A case study on job profiles assessment." Computers & Security (2022).
Ivanov, Bozhidar. "Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment." Information & Security: An International Journal 51, no. 1 (2022): 25-35.
Moon, Bo Ra, Seung Min Lee, and Won Jae Seo. "Contemporary Safety Management of Virtual Golf in South Korea." Journal of Sport and Applied Science 6, no. 1 (2022): 01-04.
Erbasli, Seyma Nur Yildir. Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication In Department of Educational Psychology. Vol. Doctor of Philosophy. University of Alberta, 2022.
Heineman, Noelle, and John Nomikos. "Counterintelligence In The Balkans And Eastern Mediterranean. The Counterintelligence Methods Of Transnational Groups." In International Scientific Conferince Strategies XXI., 2022.
Blank, Stephen. "The Critical Black Sea Zone." Connections: The Quarterly Journal 21, no. 4 (2022): 115-128.
S. Nisha, Shajun, Harshal Patil, Akash Bag, Amarendra Singh, Yogendra Kumar, and Santosh J Kumar. Critical Information Framework against Cyber-Attacks using Artificial Intelligence and Big Data Analytics In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Greater Noida, India, 2022.
Ivantsov, Sergey Vyacheslav, and Aleksey Valeryevic Saranov. "Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States." All-Russian Criminological Journal 16, no. 1 (2022): 57-72.
Li, Wei, Cheng-shu Wu, and Su-mei Ruan. "CUS-RF-Based Credit Card Fraud Detection with Imbalanced Data." Journal of Risk Analysis and Crisis Response 12, no. 3 (2022): 110-123 .
Liebetrau, Tobias. "Cyber conflict short of war: a European strategic vacuum ." European Security (2022).
Hall, Lynne, Samiullah Paracha, Gill Hagan-Green, Catrina Ure, and Phil Jackman. Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners In 35th International BCS Human-Computer Interaction Conference. Keele: Keele University, 2022.
Mednikarov, Boyan, Yuliyan Tsonev, Borislav Nikolov, and Andon Lazarov. "Cyber Hygiene Issues in the Naval Security Environment." Information & Security: An International Journal 53, no. 2 (2022): 205-218.
Baraković, Sabina, and Jasmina Baraković Husić. "Cyber hygiene knowledge, awareness, and behavioral practices of university students." Information Security Journal: A Global Perspective (2022).
Fischerkeller, Michael P., Emily O. Goldman, and Richard J. Harknett. Cyber Persistence Theory: Redefining National Security in Cyberspace. Oxford University Press, 2022.
de la Vallée, Paloma, Georgios Iosifidis, and Wim Mees. "Cyber Red Teaming: Overview of Sly, an Orchestration Tool." Information & Security: An International Journal 53, no. 2 (2022): 273-286.
Georgiev, Venelin. Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard In IT4Sec Reports., 2022.
Ben Farah, Mohamed Amine, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. "Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends." Information 13, no. 22 (2022).
Frystatzki, Gerd. Cyber-Governance-Struktur im Vergleich In Sozialwissenschaftliche Fakultät. Vol. Bachelorarbeit. Ludwig-Maximilians-Universität München, 2022.
Ungkap, Pana, and Therdpong Daengsi. "Cybersecurity Awareness Modeling Associated with Influential Factors Using AHP Technique: A Case of Railway Organizations in Thailand." In 2022 International Conference on Decision Aid Sciences and Applications (DASA). Chiangrai, Thailand, 2022.
Herath, Thilini B. G., Prashant Khanna, and Monjur Ahmed. "Cybersecurity Practices for Social Media Users: A Systematic Literature Review ." Journal of Cybersecurity and Privacy 2 (2022): 1-18.

Pages