Biblio
Export 21403 results:
A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing." Computers and Security 60 (2016).
"Professional Military Education. Appreciating Challenges of the Learning Environment." Security and Defence Quarterly 4, no. 5 (2016): 58-66.
"Proliferation of Offensive Cyber Weapons. Strategic Implications and Non-Proliferation Assumptions." Academic and Applied Research in Military and Public Management Science (AARMS) 15, no. 1 (2016): 61-73.
" A pro-Russian coup is looming in Bulgaria, the Russian embassy is silent (Zree rubladzhiiski prevrat v Bulgariya, ruskoto posolstvo mulchi). Faktor.bg, 2016.
Protection of critical infrastructure in hybrid warfare: problems and priorities of state policy of Ukraine (in Ukrainian)." Stratehichni priorytety – Strategic Priorities 3 (2016): 62-76.
"Prototyping of Intellectual Decision Support System for Organizational and Technological Trainings in Construction In XII International scientific and practical conference, “Areas of scientific thought”. Mathematics. Physics. Modern Information technologies. Sheffield, UK: Science and Education , 2016.
The Putin Administration's Use of 'Conspiracy Theories' against Former Communist States. The Case of Bulgaria. Southeastern Europe, Brill, 2016.
Putin’s Foreign Policy: The Quest to Restore Russia’s Rightful Place." Foreign Affairs 95, no. 3 (2016): 33-34.
"Putin's Hydra: Inside Russia's Intelligence Services. European Council on Foreign Relations, 2016.
Putin's Propaganda Machine: Soft Power and Russian Foreign Policy. Rowman & Littlefield, 2016.
The Qā’idah of Adh-Dhawāhirī, and An-Nadhārī, and the Absent Yemenī Wisdom." Dabiq, Issue 6 (2016): 16-25.
"Quantitative monitoring of military transformation in the period 1992–2010: Do the protagonists of transformation really change more than other countries?" Defence Studies Volume 16, no. 1 (2016): 20-46.
"Queering the Narrative: Can the Subaltern Sex Speak?" Economic & Political Weekly 51, no. 2 (2016): 20-23.
"R2P, NATO and the Problem of Who Should Intervene?" In TSA 15th Annual Conference 2016 – University of Plymouth., 2016.
"Radicalization, Laïcité, and the Islamic Veil." Regional (2016).
"Ranking Terrorist Nodes of 26/11 Mumbai Attack using Analytical Hierarchy Process with Social Network Analysis." In 11th Annual Simposium on Information Assurance (Asia’16). Albany, NY, 2016.
"The Rapid Rise of the Islamic State in Syria: When State Weakness, Identity Politics and Regional Vacuum of Power Collide In International Affairs. Vol. Master of Arts . Lebanese American University, 2016.
Real time Hough transform based track initiators in clutter." Information Sciences 337–338 (2016): 82-92.
"Reanalyzing Li and Tao. (2014): Investigating Algorithm Recognition on Dark Irises." International Journal of Computer Applications (0975 – 8887) 155, no. 10 (2016).
"Recommendation for Key Management In NIST Special Publication., 2016.
Redefining Euro-Atlantic Values: Russia’s Manipulative Techniques. Riga: NATO Strategic Communications Centre of Excellence, 2016.
Redefining Propaganda in the Internet Age: Social Media Wars between ISIS and the US ." In 2016 International Conference on Social Media & Society., 2016.
"Reflecting Developments in Hybrid Warfare into Defence Policy." In Countering Hybrid Threats: Lessons Learned from Ukraine, 27-33. Amsterdam: IOS Press, 2016.
"