Biblio

Export 21406 results:
2018
Korsemov, Dilian, Daniela Borissova, and Ivan Mustakerov. "Group Decision Making for Selection of Supplier under Public Procurement." In ICT Innovations 2018. Engineering and Life Sciences. ICT 2018. Communications in Computer and Information Science. Vol. 940., 2018.
Borissova, Daniela. "A group decision making model considering experts competency: An application in personnel selections." Comptes rendus de l’Academie Bulgare des Sciences 71, no. 11 (2018): 1520-1527.
Guía Metodológica para la Proyección de Financiación de Capacidades. Vol. v.1.0 . Bogotá, Colombia: Ministerio de Defensa Nacional, 2018.
A Guide to IoT: Security Basics. CSO , 2018.
Board, European Data Prote. Guidelines 3/2018 on the Territorial Scope of the GDPR (Article 3) - Version for Public Consultation. Vol. 19., 2018.
The guidelines on cybersecurity onboard ships In version 3. BIMCO, 2018.
Stubbs, Jack. Hackers Accused of Ties to Russia Hit Three East European Companies: Cybersecurity Firm. Reuters, 2018.
Munro, Ken. Hacking, tracking, stealing and sinking ships. Pen Test Partners, Blog: Maritime Cyber Security, 2018.
Popescu, Nicu, and Stanislav Secrieru. Hacks, Leaks and Disruptions: Russian Cyber Strategies In Chaillot Paper. Paris: European Union, Institute for Security Studies, 2018.
Shalamanov, Velizar. The Hague Talks: Academic Support to Social Networks (Ролята на академичния сектор за защита на кибер пространството от език на омразата и фалшиви новини)., 2018.
Hershtein, Lucas Oro. Ḥākimiyyah 2.0: construyendo un khilāfah virtual In Facultad de Ciencias Sociales y Jurídicas, Instituto de Relaciones Internacionales. Vol. Maestría. Universidad Nacional de La Plata, 2018.
Gupta, Rajneesh. Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain . Packt, 2018.
Matláry, Janne Haaland. Hard Power in Hard Times: Can Europe Act Strategically?. Cham: Palgrave Macmillan, 2018.
Bhunia, Swarup, and Mark Tehranipoor. Hardware Security: A Hands-on Learning Approach. San Francisco, USA: Morgan Kaufmann, 2018.
Health expenditure, public (% of GDP) – Country Ranking. Index Mundi, 2018.
"Here’s How Hostile States Are Hiding behind ‘independent’ Hackers." The Washington Post (2018): 1 February.
Gasimov, Zaur. Historical Dictionary of Azerbaijan. Rowman & Littlefield, 2018.
History of Security Police., 2018.
Homepage of the Bulgarian Military Union “Shipka” ., 2018.
Ciampaglia, Giovanni L., Azadeh Nematzadeh, Filippo Menczer, and Alessandro Flammini. "How Algorithmic Popularity Bias Hinders or Promotes Quality." Scientific reports 8, Article number: 15951, no. 1 (2018).
F.Ryman-Tubb, Nick, Paul Krause, and Wolfgang Garn. "How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark." Engineering Applications of Artificial Intelligence 76 (2018): 130-157.
Ness, Susan, and Peter Chase. How GDPR Could Affect the Transatlantic Relationship. GMF (The German Marshall Fund), 2018.
Orenstein, Mitchell A., and Peter Kreko. "How Putin’s Favorite Biker Gang Infiltrated NATO." Foreign Affairs (2018).
Kruzel, John. How Russian Trolls Exploited Parkland Mass Shooting on Social Media. Politifact, 2018.
Monov, Lyubomir, and Maksim Karev. "How to Counter Hybrid Threats?" Information & Security: An International Journal 39, no. 2 (2018): 113-126.

Pages