Export 17217 results:
The Unified Modeling Language (UML) Web Page., 2019.
Andriichuk, Oleh, Vitaliy Tsyganok, Dmitry Lande, Oleg Chertov, and Yaroslava Porplenko. "Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition." In DIGILIENCE 2019., 2019.
Aaltola, Kirsi, and Petteri Taitto. "Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
Bontchev, Vesselin. "A VBA P-Code Disassembler." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Omelicheva, Mariya, and Lawrence Markowitz. Webs of Corruption: Trafficking and Terrorism in Central Asia. New York: Columbia University Press, 2019.
Costigan, Sean, and Greg Gleason. "What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security." Information & Security: An International Journal 43, no. 1 (2019): 13-20.
De Groot, Juliana. What is HIPAA Compliance? 2019 HIPAA Requirements. Digital Guardian, 2019.
De Groot, Juliana. What is SOX Compliance? 2019 SOX Requirements & More. Digital Guardian, 2019.
Muddana, Varshita. What is the Future of IoT or Internet of Things in next 5 years?. SoftScript, IoT, Latest News, Marketing Trends, 2019.
Fertasi, Nadja El. "Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence." Information & Security: An International Journal 42 (2019).
Velichkova, Rositsa, and Iskra Simova. "Wildland Fire Suppression Measures with Water Resources from Nature." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Aron, Raymond, Kishore Mahbubani, Fawaz Gerges, Alioune Sall, Nicole Gnesotto, and Jared Cohen. The world in 10 years. Institut Français des Relations Internationales (IFRI) , 2019.
Доронін, Іван. "Контрольні Повноваження Президента України у Сфері Національної Безпеки: Проблеми і Перспективи." Адміністративне право і процес 2 (2019).
Николић, Дејан Ж., Митар Ковач, and Влада М. Митић. "Менаџмент у одбрани – основне функције [Defence Management – Main Functions]." Воjно дело 71, no. 1 (2019): 99-126.
2018 Payment Security Report. Verizon, 2018.
Abschlussbericht des Sonderbeauftragten des Senats für die Aufklärung des Handelns der Berliner Behörden im Fall AMRI. , 2018.
Akgül, Yakup. "Adoption of E-Government Services in Turkey." AJIT-e: Online Academic Journal of Information Technology 9, no. 32 (2018).
Roloff, Ralf, and Pàl Dunay. "The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank." Connections: The Quarterly Journal 17, no. 2 (2018): 19-35.
Kumari, Priyanka, and Smita Prava Mishra. "Analysis of Credit Card Fraud Detection Using Fusion Classifiers." In Computational Intelligence in Data Mining, 111-122., 2018.
Android Devices Ship with Pre-installed Malware. Avast Threat Labs, 2018.
Hristozov, Ivan. "Application of Information and Communications Technologies and Means of Radio-electronic Warfare in Hybrid War." Information & Security: An International Journal 39, no. 3 (2018): 265-274.
Živec, Katarina. Application of Mackinder’s Heartland Theory to Past and Present Geopolitical Significance of Central Asia In Perspectives., 2018.
Branch, Anthony R.. "Armenia and the South Caucasus: A New Security Environment." Connections: The Quarterly Journal 17, no. 2 (2018): 47-60.
Luhn, Alec. "Armenia Opposition Leader Nikol Pashinyan Elected PM by Parliament." The Telegraph (2018).
Armenian Ceasefire Violation: Azerbaijan’s Serviceman Killed. Trend , 2018.