Export 17820 results:
Costigan, Sean, and Greg Gleason. "What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security." Information & Security: An International Journal 43, no. 1 (2019): 13-20.
Boulton, Clint. What is Digital Transformation? A Necessary Disruption. CIO, 2019.
De Groot, Juliana. What is HIPAA Compliance? 2019 HIPAA Requirements. Digital Guardian, 2019.
De Groot, Juliana. What is SOX Compliance? 2019 SOX Requirements & More. Digital Guardian, 2019.
Muddana, Varshita. What is the Future of IoT or Internet of Things in next 5 years?. SoftScript, IoT, Latest News, Marketing Trends, 2019.
Ladid, Latif, Jart Armin, and Heidi Kivekäs. Whitepaper: The Finish Electronic Communi¬cations Regulator TRAFICOM – A Cybersecurity Reference Model for Europe. Helsinki: SAINT Consortium/Traficom, 2019.
Volgin, Petar. Why are the Russophobes angry? Washington will try to stop “Turkish Stream“ at any cost”., 2019.
Fertasi, Nadja El. "Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence." Information & Security: An International Journal 42 (2019).
Why is Emilian Gebrev wandering the television studios?. Monitor, 2019.
Velichkova, Rositsa, and Iskra Simova. "Wildland Fire Suppression Measures with Water Resources from Nature." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Aron, Raymond, Kishore Mahbubani, Fawaz Gerges, Alioune Sall, Nicole Gnesotto, and Jared Cohen. The world in 10 years. Institut Français des Relations Internationales (IFRI) , 2019.
Доронін, Іван. "Контрольні Повноваження Президента України у Сфері Національної Безпеки: Проблеми і Перспективи." Адміністративне право і процес 2 (2019).
Николић, Дејан Ж., Митар Ковач, and Влада М. Митић. "Менаџмент у одбрани – основне функције [Defence Management – Main Functions]." Воjно дело 71, no. 1 (2019): 99-126.
2018 Best Practice Guidelines for the EU Code of Conduct on Data Centre Energy Efficiency In JRC Technical Reports. European Commission, 2018.
2018 Payment Security Report. Verizon, 2018.
Abschlussbericht des Sonderbeauftragten des Senats für die Aufklärung des Handelns der Berliner Behörden im Fall AMRI. , 2018.
Akgül, Yakup. "Adoption of E-Government Services in Turkey." AJIT-e: Online Academic Journal of Information Technology 9, no. 32 (2018).
Roloff, Ralf, and Pàl Dunay. "The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank." Connections: The Quarterly Journal 17, no. 2 (2018): 19-35.
Mylrea, Michael. AI Enabled Blockchain Smart Contracts: Cyber Resilient Energy Infrastructure and IoT In 2018 AAAI Spring Symposium Series., 2018.
Kumari, Priyanka, and Smita Prava Mishra. "Analysis of Credit Card Fraud Detection Using Fusion Classifiers." In Computational Intelligence in Data Mining, 111-122., 2018.
M. Gunduz, Zekeriya, and Resul Das. "Analysis of Cyber-attacks on Smart Grid Applications." In 2018 International Conference on Artificial Intelligence and Data Processing (IDAP). Malatya, Turkey, 2018.
Notarmuzi, Daniele, and Claudio Castellano. "Analytical Study of Quality-Biased Competition Dynamics for Memes in Social Media." arXiv preprint arXiv:1803.08511 (2018).
Shao, Chengcheng, Pik-Mai Hui, Lei Wang, Xinwen Jiang, Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. "Anatomy of an Online Misinformation Network." PloS One 13, no. 4 (2018).
Android Devices Ship with Pre-installed Malware. Avast Threat Labs, 2018.
Roeva, Olympia. "Application of Artificial Bee Colony Algorithm for Model Parameter Identification." In Innovative Computing, Optimization and Its Applications, 285-303. Springer, Cham, 2018.