Works matching Cyber intelligence (Computer security)
1
- Macromolecular Symposia, 2021, v. 396, n. 1, p. 1, doi. 10.1002/masy.202000326
- Raicu, Alexandra;
- Raicu, Gabriel
- Article
2
- Cihan University-Erbil Scientific Journal, 2024, v. 8, n. 2, p. 43, doi. 10.24086/cuesj.v8n2y2024.pp43-48
- QasMarrogy, Ghassan A.;
- Nahi, Abdullah A.;
- Yousif, Rose M. S.
- Article
3
- Wiley Interdisciplinary Reviews: Forensic Science, 2022, v. 4, n. 4, p. 1, doi. 10.1002/wfs2.1448
- Rendall, Kieran;
- Mylonas, Alexios;
- Vidalis, Stilianos
- Article
4
- Uporabna Informatika, 2022, v. 33, n. 5, p. 208
- Bregar, Andrej;
- Gjergjek, Sašo;
- Novak, Miran;
- Orlić, Damir
- Article
5
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2019, v. 22, n. 1, p. 1, doi. 10.21279/1454-864X-19-I1-022
- Moinescu, Radu;
- Răcuciu, Ciprian;
- Glăvan, Dragoş;
- Antonie, Narcis-Florentin;
- Eftimie, Sergiu
- Article
6
- ISSA Journal, 2021, v. 19, n. 7, p. 16
- Article
7
- ISSA Journal, 2021, v. 19, n. 1, p. 12
- Article
8
- ISSA Journal, 2020, v. 18, n. 1, p. 35
- Article
9
- ISSA Journal, 2020, v. 18, n. 1, p. 13
- Article
10
- ISSA Journal, 2020, v. 18, n. 1, p. 12
- Ciappelli, Marco;
- Martin, Sean
- Article
11
- ISSA Journal, 2019, v. 17, n. 12, p. 13
- Article
12
- ISSA Journal, 2019, v. 17, n. 10, p. 14
- Article
13
- ISSA Journal, 2019, v. 17, n. 9, p. 24
- Article
14
- ISSA Journal, 2019, v. 17, n. 9, p. 3
- Article
15
- ISSA Journal, 2019, v. 17, n. 8, p. 18
- Igonor, Andy;
- Forbes, Ray;
- McCombs, Jonathan
- Article
16
- ISSA Journal, 2019, v. 17, n. 8, p. 8
- Article
17
- ISSA Journal, 2018, v. 16, n. 4, p. 8
- Article
18
- Issues in Science & Technology, 2012, v. 28, n. 4, p. 23
- Article
19
- Financial & Credit Activity: Problems of Theory & Practice, 2023, v. 6, n. 53, p. 451, doi. 10.55643/fcaptp.6.53.2023.4130
- Havryliuk, Oleh;
- Yakushev, Oleksandr;
- Petchenko, Maryna;
- Zachosova, Nataliia;
- Bielialov, Taliat;
- Kozlovska, Svitlana
- Article
20
- Computers (2073-431X), 2025, v. 14, n. 2, p. 38, doi. 10.3390/computers14020038
- Ali, Adeel;
- Shah, Mahmood;
- Foster, Monika;
- Alraja, Mansour Naser
- Article
21
- Computers (2073-431X), 2024, v. 13, n. 3, p. 60, doi. 10.3390/computers13030060
- Chatziamanetoglou, Dimitrios;
- Rantos, Konstantinos
- Article
22
- Journal of Digital Convergence, 2019, v. 17, n. 10, p. 93, doi. 10.14400/JDC.2019.17.10.093
- Article
23
- Malaysian Journal of Computer Science, 2019, v. 32, n. 3, p. 221, doi. 10.22452/mjcs.vol32no3.4
- Rahim, Noor Hayani Abd;
- Hamid, Suraya;
- Kiah, Laiha Mat
- Article
24
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2020, v. 20, n. 39, p. 53
- Article
25
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2019, v. 19, n. 37, p. 9
- ASSENZA, Giacomo;
- SETOLA, Roberto
- Article
26
- Science & Engineering Ethics, 2019, v. 25, n. 4, p. 993, doi. 10.1007/s11948-016-9864-0
- Article
27
- Eastern-European Journal of Enterprise Technologies, 2021, v. 113, n. 9, p. 30, doi. 10.15587/1729-4061.2021.241638
- Yevseiev, Serhii;
- Pohasii, Serhii;
- Milevskyi, Stanislav;
- Milov, Oleksandr;
- Melenti, Yevgen;
- Grod, Ivan;
- Berestov, Denis;
- Fedorenko, Ruslan;
- Kurchenko, Oleg
- Article
28
- Journal of Sustainable Development (1857-8519), 2020, v. 10, n. 25, p. 30
- KAMENJARSKA, Tanja;
- JOSIMOVSKI, Sasho;
- PULEVSKA IVANOVSKA, Lidija
- Article
29
- Financial Executive, 2014, v. 30, n. 4, p. 93
- Article
30
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7620125
- Odemis, Murat;
- Yucel, Cagatay;
- Koltuksuz, Ahmet
- Article
31
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5586335
- Zhang, Huixia;
- Shen, Guowei;
- Guo, Chun;
- Cui, Yunhe;
- Jiang, Chaohui
- Article
32
- Journal of Experimental & Theoretical Artificial Intelligence, 2018, v. 30, n. 6, p. 733, doi. 10.1080/0952813X.2018.1467496
- Article
33
- World Medical & Health Policy, 2013, v. 5, n. 1, p. 37, doi. 10.1002/wmh3.19
- Barnett, Daniel J.;
- Sell, Tara Kirk;
- Lord, Robert K.;
- Jenkins, Curtis J.;
- Terbush, James W.;
- Burke, Thomas A.
- Article
34
- Security Strategies Journal / Güvenlik Stratejileri Dergisi, 2014, v. 10, n. 20, p. 119
- Article
35
- Symmetry (20738994), 2017, v. 9, n. 3, p. 36, doi. 10.3390/sym9030036
- Fang Ye;
- Xun Zhang;
- Yibing Li;
- Chunrui Tang
- Article
36
- Armenian Journal of Physics, 2021, v. 14, n. 3, p. 151, doi. 10.52853/18291171-2021.14.3-151
- Article
37
- Revista Academiei Fortelor Terestre, 2025, v. 30, n. 1, p. 162, doi. 10.2478/raft-2025-0016
- STEFANOV, Miroslav;
- BURTON, Sharon L.;
- AKBAS, Ilhan M.;
- CROUSE, Sean
- Article
38
- Revista Academiei Fortelor Terestre, 2022, v. 27, n. 1, p. 19, doi. 10.2478/raft-2022-0003
- NOBLES, Calvin;
- BURRELL, Darrell;
- WALLER, Tyrone
- Article
39
- Revista Academiei Fortelor Terestre, 2020, v. 25, n. 4, p. 281, doi. 10.2478/raft-2020-0034
- Article
40
- Buletin Stiintific, 2021, p. 154
- Article
41
- Information Systems Frontiers, 2021, v. 23, n. 4, p. 883, doi. 10.1007/s10796-020-10103-7
- Haque, Md. Farhan;
- Krishnan, Ram
- Article
42
- Information Systems Frontiers, 2020, v. 22, n. 1, p. 187, doi. 10.1007/s10796-018-9845-8
- Ezhei, Mansooreh;
- Tork Ladani, Behrouz
- Article
43
- 2019
- Acquisti, Alessandro;
- Dinev, Tamara;
- Keil, Mark
- Editorial
45
- 2019
- Mei, Lin;
- Xu, Zheng;
- Sugumaran, Vijayan
- Editorial
46
- Neural Computing & Applications, 2017, v. 28, n. 12, p. 3655, doi. 10.1007/s00521-016-2317-5
- Article
47
- Emory Law Journal, 2017, v. 66, n. 3, p. 697
- Article
48
- Emory Law Journal, 2017, v. 66, n. 3, p. 513
- Article
49
- Journal of Information Technology & Politics, 2021, v. 18, n. 1, p. 1, doi. 10.1080/19331681.2020.1776658
- Maschmeyer, Lennart;
- Deibert, Ronald J.;
- Lindsay, Jon R.
- Article
50
- Polish Quarterly of International Affairs, 2016, v. 25, n. 2, p. 35
- BOUSSIOS, EMANUEL GREGORY
- Article