Biblio

Export 21385 results:
2018
Moore, Barbara N.. Cyber Threats in e-Government. Vol. Doctor of business administration. Northcentral University, 2018.
Polatidis, Nikolaos, Michalis Pavlidis, and Haralambos Mouratidis. "Cyber-attack Path Discovery in a Dynamic Supply Chain Maritime Risk Management System." Computer Standards & Interfaces 56 (2018): 74-82.
Hansel, Mischa. "Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks." Journal of International Relations and Development 21, no. 3 (2018): 523-551.
Dupuy, Arnold C.. "Cyber-Energy Infrastructure Vulnerabilities in the Hybrid Warfare Environment: Some DoD Mitigation Efforts." Information & Security: An International Journal 39, no. 2 (2018): 163-174.
Koola, Paul Mario. Cybersecurity – A Systems Perspective In Dynamic Positioning Con¬ference, Marine Technology Society., 2018.
Cybersecurity Framework. NIST, USA, 2018.
Sedenberg, Elaine M., and James X. Dempsey. Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs., 2018.
"Cybersecurity law." State Gazette (2018).
Maschovitis, Chris. Cybersecurity Program Development for Business. Wiley, 2018.
Shea, Jamie. "Cyberspace as a Domain of Operations." MCU Journal 9, no. 2 (2018): 133-150.
Berk, Gábor. "Cyberspace, Its Dangers and the Current Situation of Cyber Defense in Hungary." National Security Review 3 (2018): 5-21.
MARISA. D3.2 MARISA Services Description Document., 2018.
Rai, Siddhant, Akshayanand Raut, Akash Savaliya, and Radha Shankarmani. Darwin: convolutional neural network based intelligent health assistant In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)., 2018.
Mikołajczyk, Agnieszka, and Michał Grochowski. Data augmentation for improving deep learning in image classification problem In 2018 international interdisciplinary PhD workshop (IIPhDW)., 2018.
Data Breach Investigations Report. Verizon, 2018.
Talavera, Alvaro, Luis Cano, David Paredes, and Mario Chong. "Data Mining Algorithms for Risk Detection in Bank Loans." In Information Management and Big Data, 151-159., 2018.
Minchev, Zlatogor. Data Relativities in the Transcending Digital Future In BISEC 2018. Belgrade, Serbia, 2018.
Datacenter – Part 2: What’s a Tier?. Network Alliance, 2018.
Bouazza, Imane, El Bachir Ameur, and Farid Ameur. Datamining for Fraud Detecting, State of the Art In Advanced Intelligent Systems for Sustainable Development (AI2SD’2018). Vol. 915., 2018.
Lissner, Rebecca Friedman, and Mira Rapp-Hooper. "The Day after Trump: American Strategy for a New International Order." The Washington Quarterly 41, no. 1 (2018): 7-25.
Auerbach, John, and Benjamin F. Miller. "Deaths of Despair and Building a National Resilience Strategy." Journal of Public Health Management and Practice 24, no. 4 (2018): 297-300.
Savchenko, Mykyta, Vitaliy Tsyganok, and Oleh Andriichuk. Decision Support Systems' Security Model Based on Decentralized Data Platforms In Selected Papers of the XVIII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2018)., 2018.
DEEP: Cybersecurity - A Generic Reference curriculum. nato.int, 2018.
DEEP: Generic Officer Professional Military Education - Reference Curriculum. nato.int, 2018.
DEEP: Non-Commissioned Officer Professional Military Education- Reference Curriculum. nato.int, 2018.

Pages