Biblio

Export 21385 results:
2018
Tests Document Readability: Readability Calculator. Online utility.org , 2018.
Turcsányi, Richard Q.. "Theories of Chinese Assertiveness in the South China Sea." In Chinese Assertiveness in the South China Sea. Global Power Shift (Comparative Analysis and Perspectives)., 141-167. Champp: Springer, 2018.
Ceccarelli, Andrea, Tommaso Zoppi, Alexandr Vasenev, Marco Mori, Dan Ionita, Lorena Montoya, and Andrea Bondavalli. "Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach." ACM Transactions on Cyber-Physical Systems 3, no. 2 (2018): article 18.
Akhtar, Naveed, and Ajmal Mian. "Threat of adversarial attacks on deep learning in computer vision: A survey." IEEE Access 6 (2018): 14410-14430.
.S.Suryateja, P. "Threats and Vulnerabilities of Cloud Computing: A Review." International Journal of Computer Sciences and Engineering 6, no. 3 (2018).
TIEMS Chapters., 2018.
"Tiems Contribution to Emergency and Crisis Management." Information & Security: An International Journal 40, no. 2 (2018): 213-214.
TIEMS Mission and Focus., 2018.
TIEMS TQC Certification., 2018.
Thornhil, Paula. "To Produce Strategists, Focus on Staffing Senior Leaders." War on the Rocks (2018).
Kim, Ji-yoon, Chung-ku Kang, and Kil-dong Kim. "To South Korean Youth, North Korea Is Not ‘One of Us’." The Korea Times (2018).
Tools for network planning and optimization., 2018.
"Tool-Supporting Data Protection Impact Assessments with CAIRIS." In 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE)., 2018.
Bushmaker, Jacob. "The Top 50 Cryptocurrencies." Invest in Blockchain (2018).
Ak, Tarık. "Toplumsal Güvenlik Bağlamında İç Güvenlik Yaklaşımı." Akademik Hassasiyetler 5, no. 10 (2018).
Bigelow, Brad. "The Topography of Cyberspace and Its Consequences for Operations." In 10th International Conference on Cyber Conflict. Tallinn: NATO CCD COE, 2018.
Cooker, Ian A., Alexander Scott, Kasia Sliwinska, Novia Wong, Soham V. Shah, Jihun Liu, and David Schuster. Towards Robust Models of Cyber Situation Awareness In Advances in Intelligent Systems and Computing. Vol. 782. Cham: Springer, 2018.
A., Deljoo, Van Engers T., Koning R., Gommans L., and De Laat C.. Towards Trustworthy Information Sharing by Creating Cyber Security Alliances In 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications . New York, USA, 2018.
Chincholkar, Y. D., and Ayush Kumar. "Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles." Automation and Autonomous System 10, no. 6 (2018).
Chincholkar, Y. D., and Ayush Kumar. " Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles." Automation and Autonomous System 10, no. 6 (2018).
Sukhodolia, Oleksandr. "Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience." Information & Security: An International Journal 40, no. 2 (2018): 120-128.
Zheng, Lutao, Guanjun Liu, Chungang Yan, and Changjun Jiang. "Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity." IEEE Transactions on Computational Social Systems 5, no. 3 (2018).
Pokorný, Ladislav. "Transformace československých (a českých) zpravodajských služeb [Transformation of the Czechoslovak (and Czech) Intelligence Services]." In Security Theory and Practice, 57-76. Vol. 2. Prague: Police Academy of the Czech Republic, 2018.
Landler, Mark. "Trump Abandons Iran Nuclear Deal He Long Scorned." The New York Times (2018).
Ekşi, Muharrem. "Türk Dış Politikasının Ultimo Ratiosu: Yumuşak Güçten Sert Güce Türkiye’nin Suriye Politikası." Karadeniz Araştırmaları XV, no. 60 (2018): 71-99.

Pages