Biblio
Export 21430 results:
Is the Hybrid Threat a True Threat?" Journal of Strategic Security 9, no. 2 (2016): 6.
"Hybrid Warfare: A Known Unknown?. Foreign Policy Association, 2016.
Is hybrid Warfare a New Manner of Conducting Warfare." Review of the Air Force Academy 14, no. 2 (2016): 155-160.
"Hybrid Warfare and the Changing Character of Conflict." Connections: The Quarterly Journal 15, no. 2 (2016): 65-72.
"Hybrid Warfare: From “War During Peace” to “Neo-Imperialist Ambitions”. The Case of Russia." Modelling the New Europe. An On-line Journal, no. 21 (2016): 97-128.
"Ideas, Beliefs, Strategic Culture, and Foreign Policy: Understanding Brazil's Geopolitical Thought. University of Central Florida, 2016.
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk." Elsevier, Computers & Security 57 (2016): 31-46.
"Identity Gerrymandering: How the Armenian State Constructs and Controls “Its” Diaspora In Department of Political Science. Vol. degree of Doctor of Philosophy. Toronto: University of Toronto, 2016.
Il Blurring fra Forze Militari e di Polizia: Il Caso Italiano Alla Luce del Dibattito Internazionale." Sicurezza e Scienze Sociali 1 (2016): 55-71.
" The Image of Piracy and Maritime Terrorism – Media as the Tool for its Development." Journal of Defense Resources Management (2016).
"Imagined Communities and the Radicalization of Second Generation Muslim Women in the United Kingdom. Ottawa: University of Ottawa, 2016.
Imarat Kavkaz. Kavkazsky Uzel [Caucasian Knot], 2016.
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training." Information & Security: An International Journal 35, no. 1 (2016): 99-120.
"The impact of China-Central Asia relations on Xinjiang Uyghur Muslim riots ." Journal of Advances in Humanities and Social Sciences 2, no. 2 (2016): 55-75.
"The Impact of Corruption on National Security and Counter-corruption Strategies." In Foreword to Karin Meghesan and Valentin Stoian, Corruption and National Security: Evaluation and Response, 7-21. Bucharest: National Intelligence Academy “Michai Viteazul”, 2016.
" In the Tracks of Boko Haram in Cameroon. International Crises Group Africa, 2016.
"In the Words of the Enemy." Dabiq, no. 10 (2016): 67.
Incident Responder’s Field Guide . Waltham, MA: Digital Guardian, 2016.
Increasing Accuracy of Process-Based Fraud Detection Using a Behavior Model." International Journal of Software Engineering and Its Applications 10, no. 5 (2016): 175-188.
""Index." In Combating Transnational Terrorism, 273-277., 2016.
Indirect Rule and Varieties of Governance." Governance 29, no. 1 (2016): 13-30.
"Industry and Policy: Partnerships in Disruptive Times." Connections: The Quarterly Journal 15, no. 2 (2016): 19-29.
"Influencers characterization in a social network for viral marketing perspectives In Computer Science, Social and Information Networks. Université Rennes, 2016.