Export 17820 results:
Bureva, Veselina, Evdokia Sotirova, and Hristo Bozov. Generalized Net Model of Bio¬metric Identification Process In Proceedings of the 20th International Symposium on Electrical Apparatus and Technologies. Siela, 2018.
Bureva, Veselina, Plamena Yovcheva, and Sotir Sotirov. "Generalized Net Model of Fingerprint Recognition with Intuitionistic Fuzzy Evaluations." ntelligent Systems and Computing 641 (2018): 286-294.
Atanassov, Krassimir, Evdokia Sotirova, and Velin Andonov. "Generalized Net Model of Multicriteria Decision Making Procedure Using InterCriteria Analysis." Intelligent Systems and Computing 641 (2018): 99-111.
Andreev, Nikolay, Peter Vassilev, Vassia Atanassova, Olympia Roeva, and Krassimir Atanassov. Generalized net model of the cooperation between the Departments of transfusion Haematology and the National Centre of transfusion Haematology In Ad¬vances in Neural Networks and Applications 2018 (ANNA’18). St. Konstantin and Elena Resort, Bulgaria, 2018.
Kaszuba, Malina. "Georgia and Ukraine in the Kremlin’s Policy." Connections: The Quarterly Journal 17, no. 1 (2018): 43-59.
Georgia Corruption Rank. Trading Economics, 2018.
Severin, Thorsten, and Andrea Shalal. German government under cyber attack, shores up defenses. Reuters, 2018.
Ivashov, Leonid. "Gibridnye voinyi [Hybrid Wars]." Izborskiy Klub (2018).
Henman, Matthew. Global Militant Attacks Caused Fewer Fatalities in 2017. IHS Markit, 2018.
International Telecommunication Union. Global Partnerships with Industry Players., 2018.
Depo, Bogdana. Goliath Versus Goliath: EU Democracy Promotion in the Eastern Neighbourhood and Russia’s Alternative Agenda. Vol. PhD Thesis., 2018.
Gaddis, John Lewis. On Grand Strategy. New York: Penguin Press, 2018.
Savchuk, Vlada. "Graphic Model of The Target Audience of Psychological Influence in Social Networks." Information & Security: An International Journal 41 (2018): 81-93.
Meyer, Robinson. The Grim Conclusions of the Largest-Ever Study of Fake News: Falsehoods almost always beat out the truth on Twitter, penetrating further, faster, and deeper into the social network than accurate information. The Atlantic, 2018.
Guía Metodológica para la Proyección de Financiación de Capacidades. Vol. v.1.0 . Bogotá, Colombia: Ministerio de Defensa Nacional, 2018.
A Guide to IoT: Security Basics. CSO , 2018.
Popescu, Nicu, and Stanislav Secrieru. Hacks, Leaks and Disruptions: Russian Cyber Strategies In Chaillot Paper. Paris: European Union, Institute for Security Studies, 2018.
Shalamanov, Velizar. The Hague Talks: Academic Support to Social Networks (Ролята на академичния сектор за защита на кибер пространството от език на омразата и фалшиви новини)., 2018.
Hershtein, Lucas Oro. Ḥākimiyyah 2.0: construyendo un khilāfah virtual In Facultad de Ciencias Sociales y Jurídicas, Instituto de Relaciones Internacionales. Vol. Maestría. Universidad Nacional de La Plata, 2018.
Matláry, Janne Haaland. Hard Power in Hard Times: Can Europe Act Strategically?. Cham: Palgrave Macmillan, 2018.
Bhunia, Swarup, and Mark Tehranipoor. Hardware Security: A Hands-on Learning Approach. San Francisco, USA: Morgan Kaufmann, 2018.
Health expenditure, public (% of GDP) – Country Ranking. Index Mundi, 2018.
Maurer, Tim. Here’s how hostile states are hiding behind ‘independent’ hackers. The Washington Post, 2018.
Iliev, Andrej, Drage Petreski, and Nikola Kletnikov. "Historical Development and Perspectives of Hybrid Warfare." Information & Security: An International Journal, no. 2 (2018).
Gasimov, Zaur. Historical Dictionary of Azerbaijan. Rowman & Littlefield, 2018.