Biblio

Export 21409 results:
Filters: Filter is   [Clear All Filters]
2017
Bailey, Nick. St. Petersburg Subway Bomb: 5 Things to Know About Central Asia. NBC News, 2017.
Smith, Paul Alan. "Stakeholder Engagement Framework." Information & Security: An International Journal 38 (2017): 35-45.
The State Program for the Development of the Armed Forces of Ukraine until 2020. Ministry of Defence of Ukraine, 2017.
Statistics of Casualties in North Caucasus for 7 years. Kavkazsky Uzel [Caucasian Knot], 2017.
Kapanadze, Sergi, Ulrich Kühn, Wolfgang Richter, and Wolfgang Zellner. Status-Neutral Security, Confidence-Building and Arms Control Measures in the Georgian Context In Working Paper. Hamburg: The Centre for OSCE Research (CORE), 2017.
Stipulations of the Antiterrorist Legislation, Constraining Citizen’s Rights (in Russian) In Monitoring New Russian Laws and Their Implementation in the Field of Civil Rights., 2017.
Gauthier-Villars, David, and Drew Hinshaw. "Stockholm Attack Puts Focus on Terrorists from Central Asia." The Wall Street Journal (2017).
Stolberg, Alan. Strategic Plan for DEEP Ukraine (as of December 2016). EDWG, 2017.
Allen, Robert A., and Gareth R. T. White. "A Study of Attitudes Towards Threat in the United Kingdom Ministry of Defence Commercial Function." In British Academy of Management Conference. University of Warwick , 2017.
Zarembo, Kateryna. "Substituting for the State: The Role of Volunteers in Defense Reform in Post-Euromaidan Ukraine." Kyiv-Mohyla Law and Politics Journal 3 (2017): 47-70.
Lehto, Martti, and Jarno Limnéll. Suomen kyberturvallisuuden nykytila, tavoitetila ja tarvittavat toimenpiteet tavoitetilan saavuttamiseksi (Finland’s Cyber Security: The Present State, Vision and the Actions Needed to Achieve the Vision). Helsinki: Prime Min¬ister's Office, 2017.
Suomen kyberturvallisuusstrategian toimeenpano-ohjelma 2017-2020 (Implementation Programme for Finland’s Cyber Security Strategy for 2017-2020). Helsinki: The Security Committee, 2017.
Morsey, Christopher. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure. Robert Morris University, 2017.
Khoufi, Ines, Pascale Minet, Anis Laouiti, and Saoucene Mahfoudh. "Survey of Deployment Algorithms in Wireless Sensor Networks: Coverage and Connectivity Issues and Challenges." International journal of autonomous and adaptive communications systems 10, no. 4 (2017): 341-390.
Kemp, Harry. The Survival of Small Businesses in Northeastern Florida After a Natural Disaster In Management. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2017.
Nyberg, Per, and James Masters. Sweden Terror Suspect ‘Confesses’ to Stockholm Attack. CNN, 2017.
Gustafsson, Linus, and Magnus Ranstorp. Swedish Foreign Fighters in Syria and Iraq: An analysis of open-source intelligence and statistical data. Swedish Defence University: Center for Asymmetric Threat Studies (CATS), 2017.
Eakin, Hugh. "The Swedish Kings of Cyberwar." New York Review of Books 64, no. 1 (2017): 57.
Hryshchuk, Ruslan, and Kateryna Molodetska. "Synergetic Control of Social Networking Services Actors’ Interactions." In Recent Advances in Systems, Control and Information Technology. SCIT 2016. Advances in Intelligent Systems and Computing. Vol. 543. Cham: Springer, 2017.
Amideo, Annunziata Esposito, and Maria Paola Scaparra. A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability In Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science. Vol. 10242. Paris, France , 2017.
"Syria: ISIS to be driven out of Raqqa within two months, claims top commander." Independent (2017): August 28, 2017.
Sklyar, Vladimir, Vyacheslav Kharchenko, and Eugene Babeshko. "System of Systems as an Object of Security Analysis." In Secure and Resilient Computing for Industry and Human Domains: Secure and Resilient Systems, Networks and Infrastructures. Kharkiv: National Aerospace University “N. E. Zhukovsky”, 2017.
Zaslavsky, Vladimir. System principles, mathematical models and methods to ensure high reliability of safety systems In Proc. SPIE 10418, XI Conference on Reconnaissance and Electronic Warfare Systems., 2017.
Tsakalidis, George, and Kostas Vergidis. "A Systematic Approach Toward Description and Classification of Cybercrime Incidents." IEEE Transactions on Systems, Man, and Cybernetics: Systems (2017): 1-20.
Zandian, Zahra Karimi, and Mohammadreza Keyvanpour. "Systematic identification and analysis of different fraud detection approaches based on the strategy ahead ." International Journal of Knowledge-based and Intelligent Engineering Systems 21, no. 2 (2017): 123-134.

Pages