Biblio

Export 21402 results:
2018
Kerr, Alexandra. "Defense Institution Building in the U.S. Context." Connections: The Quarterly Journal 17, no. 3 (2018): 23-38.
Agency, Defense Security C.. Defense Institution Reform Initiative., 2018.
Hudhra, Thimi. Defense Planning for New NATO countries - Case of Albania In Security and defence faculty Department of Leadership and social sciences. Vol. doctoral thesis. Republic of Albania: Academy of The Armed Forces, 2018.
Manko, Oleg, and Yurii Mikhieiev. "Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine." Information & Security: An International Journal 41 (2018): 11-20.
Åkermark, Sia Spiliopoul, Saila Heinikoski, and Pirjo Kleemola-Juntunen. Demilitarization and International Law in Context: The Åland Islands. Routledge, 2018.
Guasti, Petra, and Zdenka Mansfeldová. "Democracy in Crisis? The Czech Republic in Post-Accession and Economic Turmoil." In Democracy Under Stress: Changing Perspectives on Democracy, Governance and Their Measurement, 71-94. Prague: Institute of Sociology of the Czech Academy of Sciences, 2018.
King, Julian. "Democracy Is under Threat from the Malicious Use of Technology. The EU Is Fighting Back." The Guardian (2018).
Shrestha, Deepanjal, Tan Wenan, Bikram Adhikari, Deepmala Shrestha, Adesh Khadka, and Seung Ryul Jeong. Design and analysis of mobile based tourism security application: Concepts, artifacts and challenges., 2018.
Conroy, M.. Design and Development with Very Distributed Teams., 2018.
Putra, Septaansyah Dwi, Ma 'muri, Sarwono Sutikno, Yusuf Kurniawan, and Adang Suwandi Ahmad. "Design of an AES Device as Device Under Test in a DPA Attack." International Journal of Network Security 20, no. 2 (2018): 256-265.
Porkoláb, Imre, and Ben Zweibelson. "Designing a NATO that Thinks Differently for 21st Century Complex Challenges." Applied Social Sciences DR 1 (2018): 196-212.
Kurniawan, Ade, and Imam Riadi. "Detection and Analysis Cerber Ransomware Based on Network Forensics Behavior." International Journal of Network Security 20, no. 5 (2018): 836-843.
Kara, Ilker. "Detection, Technical Analysis and Solution of Teslacrypt Ransomware Virus." International Journal of Management Information Systems and Computer Science 2, no. 2 (2018): 87-94.
Let, V. V., and I.S. Skitter. Determination of non-standard behavior of the network by methods of statistical analysis In Thirteenth International Scientific and Practical Conference "Mathematical and Simu-lation Modeling of Systems MODS 2018". Chernihiv-Kiev-Zhukin, 2018.
Al-Khafaji, Ahmed Waleed. "Development of PSMECA Analysis Technique Applying IoT Components in Physical Security Systems." Radioelectronic and computer systems 3 (2018).
Shalamanov, Velizar. Development of the Deterrent and Defense Capacity of NATO in Eastern Europe: Approach to Readiness and Interoperabiltiy., 2018.
Shalamanov, Velizar. The development of the Eastern Balkans after joining NATO and the EU., 2018.
Diana Petrenia Becomes New Head Of MOD Reforms Project Office. The Ministry of Defence of Ukraine, Reforms Project Office, 2018.
Diarrhoeal disease. World Health Organisation, 2018.
Meier-Walser, Reinhard. Die NATO im Funktions- und Bedeutungswandel. Wiesbaden: Springer, 2018.
ACME Business Consulting, LLC. Digital Security Program (DSP)., 2018.
Saddik, Abdulmotaleb El. "Digital Twins: The Convergence of Multimedia Technologies." IEEE MultiMedia 25, no. 2 (2018): 87-92.
Studies, Defense Institute. DILLS Charter., 2018.
Tang, MingJian, Mamoun Alazab, Yuxiu Luo, and Matthew Donlon. "Disclosure of Cyber Security Vulnerabilities: Time Series Modelling." International Journal of Electronic Security and Digital Forensics 10, no. 3 (2018): 255-275.
Samuilova, Simona. "Disinformation in the Ideological Race during the Cold War and its Heritage." Bulgarian Historical Review / Revue Bulgare d'Histoire 1-2 (2018): 155-178.

Pages