Biblio

Export 21404 results:
2015
Timberg, Craig. "Net of Insecurity: A Flaw in the Design." The Washington Post (2015).
Monte, Matthew. Network Attacks and Exploitation: A Framework. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2015.
Estelle, Emily, Harleen Gambhir, and Kaitlynn Menoche. Network Graph of ISIS’s Claimed Attack in Paris. Institute for the Study of the War, 2015.
Network Member Responds to New York Times Article on Afghan Policewomen. Institute for Inclusive Security, 2015.
Antivachis, N.A., and Vasilis Angelis. "Network Organizations: The Question of Governance." Procedia - Social and Behavioral Sciences 175, no. 12 (2015): 584-92.
Meseguer, Víctor Mateu. New approaches for electronic voting paradigms In Departament de Matemàtica . Vol. Doctor. Universitat de Lleida, 2015.
Bērziņš, Jānis. "A New Generation of Warfare." Per Concordiam 6, no. 3 (2015).
Rácz, András, and Sinikukka Saari. "The New Minsk Ceasefire: A Breakthrough or Just a Mirage in the Ukrainian Conflict Settlement?" FIIA Comment 5 1 (2015).
Kayani, Imran K., Mansoor Ahsan, Imran M. Rashid, and Shair Afgan Rind. "A new perspective to velocity control for fixed wing UAVs." In 2015 International Conference on Information and Communication Technologies (ICICT) . Karachi, Pakistan, 2015.
Burke, Jason. "The New Threat from Islamic Militancy.", 44-45. London: The Bodley Head, 2015.
Drent, Margriet, Rob Hendriks, and Dick Zandee. New Threats, New EU and NATO Responses In Clingendael Report. Netherlands Institute of International Relations Clingendael, 2015.
Gibbons-Neff, Thomas. "The ‘new’ type of war that finally has the Pentagon’s attention." Washington Post (2015).
Nexus of banned outfits, criminals ‘Channel 2’ unearthed in Karachi. Geonews, 2015.
DeMars, William E., and Dennis Dijkzeul. The NGO Challenge for International Relations Theory. New York: Routlege, 2015.
Baker, Aryn. Nigeria Military Quails when faced with Boko Haram. TIME, 2015.
Nine British Medics Feared to Have Crossed into Syria. BBC News, 2015.
Perry, Bret. "Non-Linear Warfare in the Ukraine: The Critical Role of Information Operations and Special Operations." Small Wars Journal (2015).
Meulenbelt, Stephanie E., and Maarten S. Nieuwenhuizen. "Non-State actors’ pursuit of CBRN weapons: From motivation to potential humanitarian consequences." International Review of the Red Cross 97, no. 899 (2015): 831-858.
Jovanovic, Milos. Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross-country Comparison, in Exploring the Security Landscape – Non-traditional Security Challenges In forthcoming. Dordrecht: Springer, 2015.
Dzebisashvili, Shalva. "Norms versus Interests: The Ambiguous Nature of NATO’s Democratic Conditionality in Armenia." Connections: The Quarterly Journal 14, no. 2 (2015): 13-35.
O’Dwyer, Gerard. Norway Prioritizes High North Equipment . Defense News, 2015.
Maigre, Merle. Nothing New in Hybrid Warfare: The Estonian Experience and Recommendations for NATO In Policy Brief. German Marshall Fund of the United States, 2015.
Manjula, D., and J. Thilagavathi. "A Novel Approach for Behavior based Charge Card Fraud Detection using Support Vector Machines." IJSRD - International Journal for Scientific Research & Development| 3, no. 6 (2015).
Lee, Chae Chang, and Ji Won Yoon. "A novel statistical approach to detect card frauds using transaction patterns." IEICE Transactions on Information and Systems E98D, no. 3 (2015): 649-660.
NSA Serbia, Support to the National Security Council and the Coordination Bureau for Security Services., 2015.

Pages