Biblio

Export 21409 results:
Filters: Filter is   [Clear All Filters]
2017
Sukhodolia, Oleksandr. "The energy dimension of war: An overview of the Ukrainian events in 2014–2016." Energy Security: Operational highlights 11 (2017): 25-34.
Enforcement Information for July 20, 2017. Office of Foreign Assets Control, U.S. Department of Treasury, 2017.
Sottilare, Robert A., Rodney A. Long, and Benjamin S. Goldberg. Enhancing the Experience Application Program Interface (xAPI) to Improve Domain Competency Modeling for Adaptive Instruction In Fourth (2017) ACM Conference on Learning @ Scale. Cambridge, Massachusetts, USA , 2017.
ENISA Threat Landscape Report 2016. Heraklion: European Union Agency for Network and Information Security, 2017.
Kazi, Abdul Ghafoor, Rosman Bin Md Yusoff, Fadillah Binti Ismail, Erni Munastiwi, and Muzammil Muhammad K. Arisar. "Entrepreneurship and Livelihood Restoration at Sindh Pakistan: Mediating Role of Firm Performance." Advanced Science Letters 23, no. 9 (2017): 8138-8143.
Shevchenko, Viktor, and Alina Shevchenko. The Epidemiological Approach to Information Security Incidents Forecasting for Decision Making Systems In 13-th International Conference Perspective Technologies and Methods in MEMS Design (MEMSTECH). Polyana, UKRAINE, 2017.
Esri Story Map 2017 Terrorist Attacks., 2017.
Work, Robert. Establishment of an Algorithmic Warfare Cross-Functional Team (Project Maven). govexec, 2017.
Rogers, Peter. "The Etymology and Genealogy of a Contested Concept." In The Routledge Handbook of International Resilience, 13-25. Abingdon, UK: Routledge, 2017.
Danielyan, Emil. EU Reveals Landmark Deal With Armenia. Radio Azatutyun, Radio Free Europe/Radio Liberty, 2017.
Emmery, Chris. Euclidean vs. Cosine Distance., 2017.
EUCOM), United States Eur. European Reassurance Initiative (ERI) Fact Sheet., 2017.
Richards, Melvin S.. Evaluating the Resources, Rural Law Enforcement Management Needs to Counter Violent Extremist Behaviors. Colorado Technical University, 2017.
Finley, IB. "An Evaluation of National Cybersecurity Policies for the Maritime Transportation System." (2017).
Lewis, Jeffrey. "Everyone Fails Nuclear Weapons Tests Sometimes." Foreign Policy (2017).
Zhou, Kuang, Arnaud Martin, and Quan Pan. "Evidence combination for a large number of sources." In 20th International Conference on Information Fusion (Fusion). Xi'an, China , 2017.
Wickramarathne, Thanuka. "Evidence updating for stream-processing in big-data: Robust conditioning in soft and hard data fusion environments." In 20th International Conference on Information Fusion (Fusion). Xi'an, China , 2017.
Hartmann, Uwe. The Evolution of the Hybrid Threat, and Resilience as a Countermeasure In Research Paper. Rome: NATO Defense College, 2017.
Heydarian, Richard Javad. "Evolving Philippines-U.S.-China Strategic Triangle: International and Domestic Drivers." Asian Politics & Policy 9, no. 4 (2017): 564-582.
Ponder, Sarah, and Jonathan Matusit. "Examining ISIS Online Recruitment through Relational Development Theory." Connections: The Quarterly Journal 16, no. 4 (2017): 35-50.
Kleinschmit, Stephen W., and Vickie Edwards. "Examining the Ethics of Government-Organized Nongovernmental Organizations (GONGOs)." Journal Public Integrity 19, no. 5 (2017): 529-546.
Ex-Bundesanwalt Jost wird Sonderermittler im Fall Amri. BerlinOnline, 2017.
Exercises: Archives., 2017.
Harr, Scott J.. "Expanding Tolstoy and Shrinking Dostoyevsky. How Russian Actions in the Information Space are Inverting Doctrinal Paradigms of Warfare." Military Review 97, no. 5 (2017): 39-48.
Falcone, Alberto, Alfredo Garro, S.J.E. Taylor, A. Anagnostou, N.R. Chaudhry, and O. Salah. "Experiences in simplifying distributed simulation: The HLA development kit frame-work." Journal of Simulation 11 (2017): 208-227.

Pages