Biblio
Export 21404 results:
The Directive on security of network and information systems (NIS Directive) In Digital Agenda for Europe, A Europe 2020 Initiative, Network and Information Security., 2015.
Directorate for Emergency Situations, National Strategy for Emergency Situations. Ministry of Interior, 2015.
Disdain and Revolt in International Relations: National Identity Types and Strategies for Admitting Struggle (in Chinese)." World Economy and Politics (2015).
"Disputable Territories as Hotbeds of Tension on the Border In Bulletin of TSULBP., 2015.
Divide and Conquer: Voting Patterns and Erdoğan’s Campaign Strategy Ahead of Turkey’s Snap Election. Bipartisan Policy Center, 2015.
Doğu Akdeniz'de Güç Mücadelesi ve Kıbrıs Sorunu. International Strategic Research Organization (USAK), 2015.
Domestic Accountability for Sexual Violence: The Potential of Specialized Units in Kenya, Liberia, Sierra Leone and Uganda In International Review of the Red Cross., 2015.
Don’t Doubt the Ceasefire, Minsk II Could Freeze the Conflict in Ukraine." Foreign Affairs (2015).
"Donbas and The Crimea: The Value of Return. Kyiv: National Institute of Strategic Studies, 2015.
DPDP., 2015.
Drones, Courage, and Military Culture." In Routledge Handbook of Military Ethics , 380-393. Oxford, UK: Routledge, 2015.
"DSTU 7564: 2014, Cryptographic protection of information, Hashing function In Information Technology. Kiev: Ministry of Economic Development of Ukraine, 2015.
The Dynamics of Terrorist Innovation." In Understanding Terrorism Innovation and Learning: Al-Qaeda and Beyond, 76-95. Oxon and New York: Routledge, 2015.
" EC ECHO - Civil Protection., 2015.
The Education of “Jihadi John”." The New York Times (2015): A1.
"efense Management Research Capacities and Topics: Blind Spots in Defense Acquisition Management?" In International Public Procurement. Public Administration, Governance and Globalization, 89-127. Vol. 14. Cham: Springer, 2015.
"The Effect of Dictatorship In Slon., 2015.
The Effective Use of Reserve Personnel in the U.S. Military: Lessons From the United Kingdom Reserve Model. Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press, 2015.
The effective use of the DSmT for multi-class classification." In Advances and Applications of DSmT for Information Fusion. Vol. IV: Collected Works., 2015.
"The Effectiveness of Combining Simulation and Role Playing in Nursing Education. Walden University, 2015.
Effects of Cyber Security Knowledge on Attack Detection." Computers in Human Behavior 48 (2015): 51-61.
"