Biblio
Export 21441 results:
Research and analysis of responses to the questionnaire for pupils of secondary schools of the City of Skopje – Project Class for Privacy (Macedonian). Metamorphosis and DPDP, 2015.
Research and Development of Means of Password Authentication of Users of Information Systems. Vol. MR thesis [manuscript]– in Russian. Dnipropetrovsk, 2015.
Research of a complex of identification of users in information systems. Vol. MR Thesis [manuscript]- in Russian. Dnipropetrovsk, 2015.
Researching terrorism and counter-terrorism through a network lens." In Social Networks, Terrorism and Counter-terrorism., 2015.
"Resilience and Health Promotion in High-risk Professions: A Pilot Study of Firefighters in Canada and the United Kingdom." The International Journal of Interdisciplinary Organizational Studies 10, no. 2 (2015): 23-32.
"Resilience and International Politics: Premises, Debates, Agenda." International Studies Review 17, no. 3 (2015): 374-395.
"Resilience: Silver Bullet in Challenging Hybrid Warfare? In Resilienz in den Internationalen Beziehungen., 2015.
Resiliency: Enhancing Coping with Crisis and Terrorism In NATO Science for Peace and Security series. Vol. 119. Amsterdam: IOS Press, 2015.
Response of Central European Civil Security Systems to the Economic Crisis." Central European Journal of Public Policy 9, no. 2 (2015).
"Response of Central European Civil Security Systems to the Economic Crisis." Central European Journal of Public Policy 9 , no. 2 (2015).
"The Response of the Five Central Asian States to the Situation in Afghanistan: History and Trend (in Chinese)." South Asia Research (2015).
"Responsibilities of the Ministry. Copenhagen: Ministry of Defence, 2015.
Return to Babel: The Race to Integration in the Southern Caucasus." Connections: The Quarterly Journal 14, no. 2 (2015): 99-103.
"Returning Jihadis: At Luxurious Rehab Center, A Saudi Cure for Extremism. Christian Science Monitor, 2015.
Revealed: How Torture Was Used to Foil Al-Qaeda’s 2010 Plot to Bomb Two Airliners 17 Minutes Before Explosion." The Independent (2015).
"Reversible data hiding in standard midi files by adjusting delta time values." Multimedia Tools and Applications 74, no. 21 (2015): 9827-9844.
"Review of micro-Doppler signatures." IET Radar Sonar Navigation 9, no. 9 (2015): 1140-1146.
"A review of network traffic analysis and prediction techniques." arXiv preprint arXiv (2015): 1507.05722.
"The revival of Turkey’s 'lynching' culture. Al-Monitor, 2015.
The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity. Vol. Master of Arts. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2015.
Rise of ISIS: A Threat We Can’t Ignore. Brentwood, TN: Howard Books, 2015.