Biblio
Export 21400 results:
Geef Bewakingsagenten Nog Meer Bevoegdheden." De Tijd (2016).
"General Challenges of Intelligence Service Reform." In Proceedings from the Third International Conference “Governance and Reform of State Security Services: Best Practices", 41-45. Kyiv, Ukraine, 2016.
"A Generic Reference Curriculum on Cybersecurity." Information & Security: An International Journal 35, no. 2 (2016): 181-184.
"Genetic algorithm for k-connected relay node placement in wireless sensor networks In Second International Conference on Computer and Communication Technologies. New Delhi, India: Springer, 2016.
The Geography of Border Militarization: Violence, Death and Health in Mexico and the United States." Journal of Latin American Geography 15, no. 1 (2016): 7-32.
"Georgia. Freedom House, 2016.
The German Initiative for Arms Control: Time for Dialogue with Russia. Ośrodek Studiów Wschodnich, 2016.
Germany’s New Problem Border: Poland. Politico, 2016.
Getting Gerasimov Right." Military Review 96, no. 1 (2016): 30-38, quote on p. 34.
"Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level." Connections: The Quarterly Journal 15, no. 3 (2016): 17-32.
"Global Security Brief #3: Climate Change Poses Greater Security Threat than Terrorism. World Watch Institute, 2016.
‘Good’ and ‘Bad’ Investments: Everything You Always Wanted to Know about Ukrainian Commanders but Were Afraid to Ask." Connections: The Quarterly Journal 15, no. 1 (2016): 57-71 .
"Google Faces EU Curbs on How It Tracks Users to Drive Adverts." Financial Times (2016).
"Governing Islam and Security in Tajikistan and Beyond: The Emergence of Transnational Authoritarian Security Governance. Vol. PhD. Exeter: United Kingdom: University of Exeter, 2016.
Government Technology., 2016.
A graph-based, semi-supervised, credit card fraud detection system In Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence. Vol. 693. Cham: Springer, 2016.
A grayscale watermark technique using sub-sampling and singular value decomposition." In International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Chennai, India , 2016.
"Growing Evidence of Islamic State in Pakistan." Terrorism Monitor 14, no. 3 (2016): 3-5.
"Growth of IT-specialists Quantity on the Separate Types of the Certification Programs. Monster Blog, 2016.
Guide to Cyber Threat Information Sharing In NIST Special Publication . Gaithersburg, MD: National Institute of Standards and Technology, 2016.
Guide to Cyber Threat Information Sharing In Special Publication. National Institute of Standards and Technology (NIST), 2016.
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce 2.0 . Boca Raton, FL: CRC Press, 2016.
Hacked: Putin Aide’s Emails Detail Alleged Plot to Destabilize Ukraine." Foreign Policy (2016).
"