Biblio
Export 21404 results:
Government Security Centre., 2015.
GPS Spoofing Is Now A Real Threat – Here’s What Manufacturers of GPS Devices Need to Know. Spirent blog, 2015.
The Gray Zone." In White paper. Vol. 1., 2015.
"Green Computing within the Context of Educational and Research Projects In Recent Advances in Computer Science, Proceedings of the 19th International Conference on Computers (part of CSCC'15). Zakynthos Island, Greece, 2015.
The Green Paper on Critical Infrastructure Protection: Analytical report. Kyiv: NISS, 2015.
Green Paper on Critical Infrastructure Protection in Ukraine: Collected Materials from International Expert Meetings . Kyiv: National Institute for Strategic Studies, 2015.
Grid Occupancy Estimation for Environment Perception Based on Belief Functions and PCR6 In Signal Processing, Sensor/Information Fusion, and Target Recognition XXIV. Vol. 9474. Baltimore, Maryland, United States, 2015.
Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly, 2015.
The Growth Game-Changer: How the Industrial Internet of Things can drive progress and prosperity. Accenture Strategy, 2015.
Gun Homicide and Violent Crime. Pew Research Center’s Social and Demographic Trends, 2015.
Hacker Killed by Drone Was Islamic State’s ‘Secret Weapon’." Wall Street Journal (2015).
" "The Hand That Feeds: Kiev Now Unable to Survive without Extremist Support." Sputnik (2015).
Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM)., 2015.
Hard thinking about Russian soft power: What to do next?" Russia Direct (2015).
"Harnessing Cyber-technology’s Human Potential." Special Warfare 28, no. 4 (2015): 15.
"Here’s How to Make Sense of the Violence in Western Ukraine: Follow the Money." Atlantic Council (2015).
"Hereditary Functional Individuality of Semiconductor Sensors." Functional Materials 22, no. 3 (2015): 387-391.
"The hidden hand behind the Islamic State militants? Saddam Hussein’s." Washington Post (2015).
"Hijra – My Story." Al-Risalah 1 (2015).
"Hippocratic data sharing in e-government space with contract management In Information Technology in the Department of Information Technology Faculty of Accounting and Informatics. Vol. Magister Technologiae. Durban University of Technology, 2015.
Holistic Design of Collaborative Net-works of Design Engineering Organizations." In Risks and Resilience of Collaborative Networks, IFIP Advances in Information and Communication Technology. Vol. 463., 2015.
"Hollande says Paris attacks an ‘act of war’ by Islamic State group. France 24, 2015.
‘Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.
Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.