Biblio

Export 21362 results:
2016
Wieslander, Anna. "How NATO and the EU Can Cooperate to Increase Partner Resilience." In Forward Resilience: Protecting Society in an Interconnected World, 137-148. Washington: Center for Transatlantic Relations, 2016.
Porter, Geoff D.. "How realistic is Libya as an Islamic State “fallback”?" CTC Sentinel 9, no. 3 (2016): 1-5.
How Russian oligarchs turned the country of Latvia into their own personal money laundering machine. Gangsters Inc., 2016.
Porup, J.M.. How to Search the Internet of Things for Photos of Sleeping Babies. ArsTechnica, 2016.
Goelz, Margaret. Human Security, United Nations Security Council Resolution 1325, and Vulnerable People: Rhetoric, Solidarity, and Silences in International Human Rights Discourses on Syrian Women Refugees In Faculty of the College of Literature, Science, & Arts. Vol. Bachelor of Science. University of Michigan, 2016.
Anton, Mihail. Hybrid pedagogies for hybrid war In Proceedings of Scientific Research and Education in the Air Force, AFASES 2016. Vol. 18., 2016.
Raugh, David L.. "Is the Hybrid Threat a True Threat?" Journal of Strategic Security 9, no. 2 (2016): 6.
Jankowski, Dominik P.. Hybrid Warfare: A Known Unknown?. Foreign Policy Association, 2016.
Ştefănescu, Daniel-Cornel. "Is hybrid Warfare a New Manner of Conducting Warfare." Review of the Air Force Academy 14, no. 2 (2016): 155-160.
Giegerich, Bastian. "Hybrid Warfare and the Changing Character of Conflict." Connections: The Quarterly Journal 15, no. 2 (2016): 65-72.
C. Apetroe, Alexandru. "Hybrid Warfare: From “War During Peace” to “Neo-Imperialist Ambitions”. The Case of Russia." Modelling the New Europe. An On-line Journal, no. 21 (2016): 97-128.
Pontes, Marcos Rosas Dega. Ideas, Beliefs, Strategic Culture, and Foreign Policy: Understanding Brazil's Geopolitical Thought. University of Central Florida, 2016.
Shahzad, Malik, Kaleem Awan, Pete Burnap, and Omer Rana. "Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk." Elsevier, Computers & Security 57 (2016): 31-46.
Cavoukian, Kristin. Identity Gerrymandering: How the Armenian State Constructs and Controls “Its” Diaspora In Department of Political Science. Vol. degree of Doctor of Philosophy. Toronto: University of Toronto, 2016.
Striuli, Lorenzo. "Il Blurring fra Forze Militari e di Polizia: Il Caso Italiano Alla Luce del Dibattito Internazionale." Sicurezza e Scienze Sociali 1 (2016): 55-71.
van Uhm, Daan P.. The Illegal Wildlife Trade: Inside the World of Poachers, Smugglers and Traders. Springer, 2016.
Nowakowska-Krystman, Aneta, and Piotr Gawliczek. "The Image of Piracy and Maritime Terrorism – Media as the Tool for its Development." Journal of Defense Resources Management (2016).
Comeau, Kelsey Ann. Imagined Communities and the Radicalization of Second Generation Muslim Women in the United Kingdom. Ottawa: University of Ottawa, 2016.
Imarat Kavkaz. Kavkazsky Uzel [Caucasian Knot], 2016.
Androulidakis, Iosif, Vyacheslav Kharchenko, and Andriy Kovalenko. "Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training." Information & Security: An International Journal 35, no. 1 (2016): 99-120.
Qianli, Liang. "The impact of China-Central Asia relations on Xinjiang Uyghur Muslim riots ." Journal of Advances in Humanities and Social Sciences 2, no. 2 (2016): 55-75.
Tagarev, Todor. "The Impact of Corruption on National Security and Counter-corruption Strategies." In Foreword to Karin Meghesan and Valentin Stoian, Corruption and National Security: Evaluation and Response, 7-21. Bucharest: National Intelligence Academy “Michai Viteazul”, 2016.
Severinsen, Jens. In Fear of Colour Revolutions: A Neoclassical Realist Study of Russia’s Colourless Foreign Policy in the Post-Soviet Space., 2016.
Heungoup, Hans De Marie. In the Tracks of Boko Haram in Cameroon. International Crises Group Africa, 2016.
"In the Words of the Enemy." Dabiq, no. 10 (2016): 67.

Pages