Export 18303 results:
Nacheva, Radka, and Snezhana Sulova. "Research on the Overall Attitude Towards Mobile Learning in Social Media: Emotions Mining Approach." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Minchev, Zlatogor. "Research-focused Cyber Exercises: National State-of-the-Art Academic Experience and Perspectives." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Happa, Jassim. "Resilience from Self-Discrepancy Theory." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Green, Andrew, Amy B. Woszczynski, Kelly Dodson, and Peter Easton. Responding to Cybersecurity Challenges: Securing Vulnerable US Emergency Alert Systems In Communications of the Association for Information Systems., 2019.
Risk Management – Risk Assessment Techniques. International Organization for Standardization , IEC 31010:2019., 2019.
Yanakiev, Yantsislav, and Dimitrina Polimirova. "The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Smilov, Daniel. Rumen Radev: a composition based on the picture of Reshetnikov. Deutsche Welle, 2019.
Sarbanes-Oxley Act., 2019.
Tagarev, Todor, and Nikolai Stoianov. "Scoping the Scenario Space for Multi-sector Cybersecurity Analysis." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Monitor, ISIJ. "Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience” (DIGILIENCE 2020)." Information & Security: An International Journal 43, no. 3 (2019): 397-398.
Paunova, Polina. The secret diary of Tsvetan Tsvetanov. Svobodna Evropa, 2019.
Secure Digital Future 21 Web Page., 2019.
Molstad, Kristine Sommerstad. The Shadow in the Mirror : The Politics and Psychology of the Internalised Double in Chuck Palahniuk’s Fight Club and Jess Walter’s The Zero. Vol. Master's thesis. University of Agder, 2019.
Thomson, Iain. Sinister Secret Backdoor Found in Networking Gear Perfect for Government Espionage: The Chinese are – Oh no, wait, it's Cisco again. The Register, 2019.
Beskow, David M., and Kathleen M. Carley. "Social Cybersecurity An Emerging National Security Requirement." Military Review (2019).
Bergh, Arild. Social Network Centric Warfare – Understanding Influence Operations in Social Media In FFI-Rapport. Norwegian Defence Research Establishment (FFI) , 2019.
Bergersen, S.. "Societal Impact Assessment Framework." Version 2, Deliverable D913.31. DRIVER+ project, 2019.
M., Hütten. "The Soft Spot of Hard Code: Blockchain Technology, Network Governance and Pitfalls of Technological Utopianism." Global Networks 19, no. 3 (2019): 329-348.
SophosLabs 2019 Threat Report. Sophos, 2019.
Cisneros-Velarde, Pedro, Diego F. M. Oliveira, and Kevin S. Chan. Spread and Control of Misinformation with Heterogeneous Agents In Complex Networks X (Proceedings of the 10th Conference on Complex Networks CompleNet 2019). Cham: Springe, 2019.
Telecommunications Industry Association. Standards., 2019.
State e-Government Agency., 2019.
A statement of the Sliven Metropolia., 2019.
Kerttunen, Mika, and Eneken Tikk. Strategically Normative. Norms and Principles in National Cybersecurity Strategies In EU Cyber Direct., 2019.
Smith, Paul Alan. "Strategy Development and Implementation in a Complex Multi-National IT Organisation." Information & Security: An International Journal 42 (2019): 13-32.