Export 17312 results:
Nami, Sanaz, and Mehdi Shajari. "Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors." Expert Systems with Applications 110 (2018): 381-392.
Monitor, ISIJ. "Countering Hybrid Warfare: Dedicated Organizations and Initiatives." Information & Security: An International Journal 39, no. 3 (2018): 301-304.
Babin, Ivan A., Anton Chablin, Aleksei Kazantsev, Mohammed A. Khesham, Yuri V. Vasiliyev, and Frederic Labarre. "Countering Radicalism in the North Caucasus." Connections: The Quarterly Journal 17, no. 2 (2018): 61-76.
Jopling, Lord. Countering Russia’s Hybrid Threats: An Update In Draft Special Report. NATO Parliamentary Assembly, 2018.
Minchev, Zlatogor, and Mitko Bogdanoski. Countering Terrorist Activities in Cyberspace In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. Vol. 139. IOS Press, 2018.
Country comparison – health expenditure. Index Mundi, 2018.
Dal Pozzolo, Andrea, Giacomo Boracchi, Olivier Caelen, Cesare Alippi, and Gianluca Bontempi. "Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy." Transactions on Neural Networks and Learning Systems 29, no. 8 (2018).
Zanin, Massimiliano, Miguel Romance, Santiago Moral, and Regino Criado. "Credit Card Fraud Detection through Parenclitic Network Analysis." Complexity (2018).
Kumari, Anju, Deepti Tamhane, Komal Rani, and Ashwini Walunj. "Credit Card Fraud Detection Using Biometric Fingerprint Authentication." IJSART 4, no. 12 (2018).
Lemon, Edward. "Critical approaches to security in Central Asia: an introduction." Central Asian Survey 37, no. 1 (2018): 1-12.
Tomović, Predrag. Crna Gora protjeruje ruskog diplomatu [Montenegro Expels a Russian Diplomat]. Radio Slobodna Evropa, 2018.
Cyber Defence. North Atlantic Treaty Organization, 2018.
Halim, Fatemeh, Salman Yussof, and Mohd Ezanee Rusli. "Cyber Security Issues in Smart Meter and Their Solutions." International Journal of Computer Science and Network Security 18, no. 3 (2018): 99-109.
Hansel, Mischa. "Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks." Journal of International Relations and Development 21, no. 3 (2018): 523-551.
Dupuy, Arnold C.. "Cyber-Energy Infrastructure Vulnerabilities in the Hybrid Warfare Environment: Some DoD Mitigation Efforts." Information & Security: An International Journal 39, no. 2 (2018): 163-174.
Data Breach Investigations Report. Verizon, 2018.
Talavera, Alvaro, Luis Cano, David Paredes, and Mario Chong. "Data Mining Algorithms for Risk Detection in Bank Loans." In Information Management and Big Data, 151-159., 2018.
Minchev, Zlatogor. Data Relativities in the Transcending Digital Future In BISEC 2018. Belgrade, Serbia, 2018.
Bouazza, Imane, El Bachir Ameur, and Farid Ameur. Datamining for Fraud Detecting, State of the Art In Advanced Intelligent Systems for Sustainable Development (AI2SD’2018). Vol. 915., 2018.
Lissner, Rebecca Friedman, and Mira Rapp-Hooper. "The Day after Trump: American Strategy for a New International Order." The Washington Quarterly 41, no. 1 (2018): 7-25.
DEEP: Cybersecurity - A Generic Reference curriculum., 2018.
DEEP: Generic Officer Professional Military Education - Reference Curriculum., 2018.
DEEP: Non-Commissioned Officer Professional Military Education- Reference Curriculum., 2018.
Defence and Armed Forces Act of the Republic of Bulgaria. State Gazette, no. 7, 2018.
Defence: EU Moves on Military Mobility. European Union, External Action Service, 2018.