Biblio

Export 21395 results:
2020
SQLite3 Arduino library for ESP32, Apache 2.0 licensed., 2020.
Fluri, Philipp H.. "Stabilization Missions – Lessons to Be Learned from Resilience-Based Peacebuilding." Connections: The Quarterly Journal 19, no. 4 (2020): 59-68.
Pleskach, Mariia, Valentyna Pleskach, Andrii Semenchenko, Danylo Myalkovsky, and Taras Stanislavsky. "Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine." Information & Security: An International Journal 45 (2020): 57-76.
Stanford Core NLP., 2020.
Stanford CorefAnnotater., 2020.
Stanford Coreference resolution., 2020.
Stanford Dependencies., 2020.
Statement of Al-Qaeda Central. As-Sahab Media Foundation, 2020.
Statement of Al-Qaeda Central. As-Sahab Media Foundation, 2020.
Stopkoronovirus. Russian Ministry of Health, 2020.
Kovács, Attila Máté. "Stranger Things – Threats and Opportunities Related to the Internet of Things." National Security Review 1 (2020): 165-177.
Kovács, Attila Máté. "Stranger Things – Threats And Opportunities Related To The Internet Of Things." Information and Communication Security 1 (2020).
Libel, Tamir. "Strategic culture as a (discursive) institution: a proposal for falsifiable theoretical model with computational operationalization." Defence Studies 20, no. 4 (2020).
Idahosa, Martins Donbruce. Strategies for Implementing Successful IT Security Systems in Small Businesses In Information Systems and Technology. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2020.
Strategies for Incident Response and Cyber Crisis Cooperation. ENISA, 2020.
Pascu, Ioan Mircea, and Nicolae-Sergiu Vintila. "Strengthening the Resilience of Political Institutions and Processes: A Framework of Analysis." Connections: The Quarterly Journal 19, no. 3 (2020): 55-66.
Shaw, D., A. Fattoum, J. Moreno, and J. Bealt. "A Structured Methodology to Peer Review Disaster Risk Reduction Activities: The Viable System Review." International Journal of Disaster Risk Reduction 2020 46, no. 101486 (2020).
Surgisphere: governments and WHO changed Covid-19 policy based on suspect da-ta from tiny US company. Guardian, 2020.
Bridges, Robert, Tarrah Glass-Vanderlan, Michael Iannacone, Maria Vincent, and Qian Chen. "Survey of Intrusion Detection Systems Leveraging Host Data." ACM Comput. Surv. 52, no. 6 (2020).
Yu, Miao, Jianwei Zhuge, Ming Cao, Zhiwei Shi, and Lin Jiang. "A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices." Future Internet 12, no. 2 (2020): article 27.
Nosratabadi, Saeed, Gergo Pinter, Amir Mosavi, and Sandor Semperger. "Sustainable Banking; Evaluation of the European Business Models." Sustainability 12, no. 6 (2020): 2314.
Ding, Xinyi, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul Krueger, and Michael Hahsler. "Swapped face detection using deep learning and subjective assessment." EURASIP Journal on Information Security 2020, no. 6 (2020).
Lande, Dmytro, Igor Subach, and Alexander Puchkov. "A System for Analysis of Big Data from Social Media." Information & Security: An International Journal 47, no. 1 (2020): 44-61.
Estay, Daniel A. Sepúlv, Rishikesh Sahay, Michael B. Barfod, and Christian D. Jensen. "A Systematic Review of Cyber-resilience Assessment Frameworks." Computers & Security 97 (2020): 101996.
Staneva, Elisaveta, and Mariyan Rachev. "Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135-140.

Pages