Biblio

Export 21409 results:
Filters: Filter is   [Clear All Filters]
2017
Global Ransomware Attack Causes Turmoil. BBC News Ukraine, 2017.
Lewis, Paul Simon. The Global Vulnerability Discovery and Disclosure System: A Thematic System Dynamics Approach In Cranfield Defence and Security. Vol. PhD. Cranfield University, 2017.
Poushter, Jacob, and Dorothy Manevich. Globally, People Point to ISIS and Climate Change as Leading Security Threats. Pew Research Center, 2017.
Filipenok, Artem, and Anjelika Basisini. A Group Connected to Al-Qaeda Claimed Responsibility for the Terrorist Act in the Underground. RBK (in Russian), 2017.
Guarda Nacional Republicana (Portugal)., 2017.
Besenyő, János. "Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania." Connections: The Quarterly Journal 16, no. 3 (2017): 23-45.
G. Kumar, Saroj, Ratna Ghosh, Debasish Ghose, and A. Vengadarajan. "Guidance of Seekerless Interceptors Using Innovation Covariance Based Tuning of Kalman Filters." Journal of Guidance, Control, and Dynamics 40, no. 3 (2017): 603-614.
Androulidakis, Iosif. "Guidelines on a Mobile Security Lab Course." Information & Security: An International Journal 37 (2017): 35-44.
Weir, Matt. Hacking 400,000 passwords, or explaining to a roommate why your electricity bill went up. Defcon 17, 2017.
Joscelyn, Thomas. "Hay’at Tahrir al Sham Leader Calls for ‘Unity’ in Syrian Insurgency." FDD’s Long War Journal (2017).
Dunn, Sarah, and Sean Wilkinson. "Hazard Tolerance of Spatially Distributed Complex Networks." Reliability Engineering & System Safety 157 (2017): 1-12.
Skovgaard-Petersen, Jakob. "Heirs of Abu Bakr: On the Ideology and Conception of History in al-Qaeda and Islamic State." Connections: The Quarterly Journal 16, no. 1 (2017): 25-36.
MIC. Heisei 28 Nen Jyoho Tsushin Media no Riyou Jikan to Jyoho Koudou ni Kansuru Chosa [Research for the Length of Time and Behavior to Use Communication Media]., 2017.
Sunaert, Willem. Het militaire beleid van de VS in de Aziatisch-Pacifische regio tijdens de Obama-administratie: Een analyse a.d.h.v. het offensief realism In Politieke Wetenschappen afstudeerrichting Internation. Vol. master. Gent: Universiteit Gent, 2017.
Middleton, Bruce. A History of Cyber Security Attacks: 1980 to Present. New York: Auerbach Publications, 2017.
Pawlak, Patryk. "Horizontal Issues." In After the EU Global Strategy – Building Resilience, 17. Paris: European Union, Institute for Security Studies, 2017.
Dua, Rohan. House Panel on Pathankot Attack Puts Punjab Police SP Salwinder Singh Under Cloud. The Times of India, 2017.
Islam, Rabiul, Greg Walkerden, and Marco Amati. "Households’ Experience of Local Government during Recovery from Cyclones in Coastal Bangladesh: Resilience, Equity, and Corruption." Natural Hazards 85, no. 1 (2017): 361-378.
Balding, Christopher. "How Badly Is China’s Great Firewall Hurting the Country’s Economy?" Foreignpolicy (2017).
Major, Claudia, and Christian Mölling. How Germany Should Change Its Approach to Arms Control. Carnegie Europe, 2017.
Ruehl, John. How Is Russia so Dangerous with an Economy Smaller than Canada’s?. PoliticsMeansPolitics.com - PMP Blog!, 2017.
Perlroth, Nicole, and Scott Shane. "How Israel Caught Russian Hackers Scouring the World for U.S. Secrets." New York Times (2017).
Holloway, Michael. How Russia Weaponized Social Media in Crimea. Realcleardefense.com, 2017.
Apple, Benjamin G.. How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study. Capella University, 2017.
Skúli, Sigurður. How to generate music using a lstm neural network in keras., 2017.

Pages