Biblio

Export 16966 results:
In Press
"Editorial." Information & Security: An International Journal 30, no. 1 (In Press): 1-10.
2019
van Tonder, Bradley, and Janet Wesson. Adaptive Interfaces for Mobile Map-based Visualisation., 2019.
Ihia, Marouane, and Omar Khadir. "Amelioration of ElGamal Digital Signature Schemes." Information & Security: An International Journal 42 (2019).
Fuentes, Gonzalo Álvarez, and Margarita Figueroa Sepúlveda. "América Latina y el desafío de la planificación basada en capacidades. Aportes preliminares desde la experiencia de Chile." Revista Relaciones Internacionales, Estrategia y Seguridad 14, no. 1 (2019).
Wirtz, Bernd W., Jan C. Weyerer, and Carolin Geyer. "Artificial Intelligence and the Public Sector—Applications and Challenges." International Journal of Public Administration 42, no. 7 (2019).
The Bulgarian Institute of Public Administration (IPA)., 2019.
COBIT resources., 2019.
Herrera, Luis-Carlos, and Olaf Maennel. "A comprehensive instrument for identifying critical information infrastructure services." International Journal of Critical Infrastructure Protection 25 (2019): 50-61.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In ISAT 2018: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018. Vol. 853. Springer, Cham, 2019.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
CoSoSys Endpoint Protector Web Page., 2019.
Oloidi, Aramide. Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study. Northcentral University, 2019.
Morris, Gerald F.. The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada. Northcentral University, 2019.
CYREX 2018 Web Page., 2019.
Zareapoor, Masoumeh, Pourya Shamsolmoali, and Afshar M. Alam. "Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction." In Digital Currency: Breakthroughs in Research and Practice. IGI Global, 2019.
The Defence Innovation Greenhouse., 2019.
DeviceLock Web Page., 2019.
eGovLab., 2019.
EU General Data Protection Regulation (Official Web Page)., 2019.
F., III. Scalise Be. Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare. Vol. Dissertation. Colorado Technical University, 2019.
Hill, Christopher. The Future of British Foreign Policy: Security and Diplomacy in a World After Brexit. Cambridge, UK: Polity Press, 2019.
Gramm-Leach-Bliley Act (GLBA) Resources., 2019.
MS, Hwang, Chou YC, Wu CC, and Yang CY. "An Improvement of Tseng–Wu Group Key Exchange Protocol." In Recent Developments in Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing. Vol. 752. Singapore: Springer, 2019.

Pages