Biblio

Export 21406 results:
2018
Zanin, Massimiliano, Miguel Romance, Santiago Moral, and Regino Criado. "Credit Card Fraud Detection through Parenclitic Network Analysis." Complexity (2018).
Kumari, Anju, Deepti Tamhane, Komal Rani, and Ashwini Walunj. "Credit Card Fraud Detection Using Biometric Fingerprint Authentication." IJSART 4, no. 12 (2018).
Blagoev, Ivan, and Vladimir Monov. "Criteria and Methodology for the Evaluation of e-Learning Management Systems based on the Specific Needs of the Organization." International Journal of Education and Information Technologies 12 (2018): 134-141.
Criteria for assessing the security of information in computer systems from unauthorized access. Ukrainians Government, 2018.
Lemon, Edward. "Critical approaches to security in Central Asia: an introduction." Central Asian Survey 37, no. 1 (2018): 1-12.
Pursiainen, Christer. "Critical infrastructure resilience: A Nordic model in the making?" International Journal of Disaster Risk Reduction 27 (2018): 632-641.
Tomović, Predrag. Crna Gora protjeruje ruskog diplomatu [Montenegro Expels a Russian Diplomat]. Radio Slobodna Evropa, 2018.
Croatian Parliament., 2018.
Korobiichuk, Igor, Vitaliy Lysenko, Olexey Opryshko, Dmitruy Komarchuk, Natalia Pasichnyk, and Andrzej Juś. "Crop monitoring for nitrogen nutrition level by digital camera, Automation 2018." Advances in Intelligent Systems and Computing 743 (2018): 595-603.
G. Davis, Doug, and Michael O. Slobodchikoff. Cultural Imperialism and the Decline of the Liberal Order: Russian and Western Soft Power in Eastern Europe. Lanham, MD: Lexington Books, 2018.
Cyber Defence. North Atlantic Treaty Organization, 2018.
Philips, Mark, Jennifer Cole, and Jennifer Towers. Cyber Norms of Behaviour: Executive Summary. Royal United Services Institute, 2018.
Lohrmann, Dan. "Cyber Range: Who, What, When, Where, How and Why?" Government Technology Magazine 31, no. 2 (2018): 529-551.
Conklin, William Arthur, and Anne Kohnke. Cyber Resilience: An Essential New Paradigm for Ensuring National Survival In 13th International Conference on Cyber Warfare and Security ICCWS 2018. Washington D.C., USA: National Defence University, 2018.
Bodeau, Deborah, Richard Graubart, Rosalie McQuaid, and John Woodill, Jr.. Cyber Resiliency Metrics and Scoring in Practice--Use Case Methodology and Examples. The MITRE Corporation, 2018.
M.-E, Paté-Cornell, P Keller, M. Smith, and M Kuypers. "Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies." Risk Analysis 2018 38(2) (2018): 226-241.
Polimirova, Dimitrina, Velizar Shalamanov, Nikolai Stoyanov, Todor Tagarev, Yantsislav Yanakiev, George Sharkov, Yavor Papazov, Vasil Rizov, and Krassimira Ivanova. Cyber Security and Opportunities for Application of Innovative Technologies in the work of the State Administration in Bulgaria. Sofia: Bulgarian Academy of Sciences, 2018.
Abu-Taieh, Evon M. O.. Cyber Security Body of Knowledge In IEEE 7th International Symposium on Cloud and Service Computing., 2018.
M., Spremić, Šimunic A., Ao S.I., L. Gelman, D.W.L Hukins, A Hunter, and A.M. Korsunsky. Cyber Security Challenges in Digital Economy In World Congress on Engineering WCE. Vol. vol. I. London, UK, 2018.
Halim, Fatemeh, Salman Yussof, and Mohd Ezanee Rusli. "Cyber Security Issues in Smart Meter and Their Solutions." International Journal of Computer Science and Network Security 18, no. 3 (2018): 99-109.
Ministry for Europe and Foreign Affairs. Cyber Security: Paris Call of 12 November 2018 for Trust and Security in the Cyber Space. France Diplomacy, 2018.
Valeriano, Brandon, Benjamin Jensen, and Ryan C. Maness. Cyber Strategy: The Evolving Character of Power and Coercion. Oxford Scholarship Online, 2018.
Moore, Barbara N.. Cyber Threats in e-Government. Vol. Doctor of business administration. Northcentral University, 2018.
Polatidis, Nikolaos, Michalis Pavlidis, and Haralambos Mouratidis. "Cyber-attack Path Discovery in a Dynamic Supply Chain Maritime Risk Management System." Computer Standards & Interfaces 56 (2018): 74-82.
Hansel, Mischa. "Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks." Journal of International Relations and Development 21, no. 3 (2018): 523-551.

Pages