Biblio
Export 21441 results:
Critical Vulnerabilities of Marine and Sea Icebased Ecosystems in the High Arctic." Regional Environmental Change (2011).
"Cryptanalysis and Security Enhancement of a “More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme”." Computer Communications 34, no. 3 (2011).
"Current issues in the acquisition of multirole fighters for the Bulgarian air force In CSDM Views. Sofia: Centre for Security and Defence Management, 2011.
Current issues in the acquisition of multirole fighters for the Bulgarian air force In CSDM Views. Sofia: Centre for Security and Defence Management, 2011.
Cyber Combat: Act of War ." The Wall Street Journal (2011).
"Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Information Science Reference, 2011.
Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept." Information & Security: An International Journal 26, no. 1 (2011): 7-11.
"Cyber Operations and the Jus Ad Bellum Revisited." Villanova Law Review 56, no. 3 (2011): 569-605.
"Cyber operations and the Jus Ad Bellum revisited." Villanova Law Review 3 (2011): 569-605.
" Cyber Security in the UK In Postnote. Houses of Parliament Parliamentary Office of Science and Technology, 2011.
Cyber Security: Time for Engagement and Debate." In European Conference on Information Warfare and Security., 2011.
"Cybercrime in Fixed Telephony Systems In Seminar 62/2011, High Tech & Cyber Crime. Brdo near Kranj, Slovenia: European Police College (CEPOL), 2011.
Cybercrime situation report In Joint Project on Regional Cooperation against Cybercrime. CyberCrime@IPA - EU/COE, 2011.
Cybersecurity and cyberdefence – elements of smart defence in 21st Century In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Cybersecurity and Cyberwarfare Preliminary Assessment of National Doctrine and Organization. Washington, D.C.: Center for strategic and international studies, 2011.
Cybersecurity Challenges and Responses." Information & Security: An International Journal 26, no. 1 (2011): 5-6.
"Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. Boston, MA: Auerbach Publications, 2011.
Cybersecurity Strategy for Germany. Federal Ministry of the Interior, 2011.
Cyberspace and the State: Toward a Strategy for Cyber-Power. New York: Routledge, 2011.
Cyberwarfare: Connecting the Dots in Cyber Intelligence." Communications of the ACM 54, no. 8 (2011): 132-140.
"CyberWinter 2011 Exercise. Sofia: Ministry of Transport, Information Technologies and Communications, 2011.
The Czech Experience With Intelligence Reforms, 1993–2010." International Journal of Intelligence and CounterIntelligence 24, no. 4 (2011).
"