Biblio
Export 21441 results:
The Stuxnet Worm. Norton by Symantec, 2015.
Successful Factors on E-Government Security Social-Technical Aspect." ARPN Journal of Engineering and Applied Sciences 10, no. 20 (2015).
"Summit Meetings. NATO, 2015.
Summit website., 2015.
The Sunni Tragedy in the Middle East. Northern Lebanon from al-Qaeda to ISIS. Princeton, NJ: Princeton University Press, 2015.
The supremacy of online white supremacists – an analysis of online discussions by white supremacists." Information & Communications Technology Law 24, no. 1 (2015).
"Surf Safely. IFS-EMMAUS, 2015.
Suruc massacre: ‘Turkish student’ was suicide bomber. BBC News, 2015.
A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)." Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지) 25, no. 6 (2015): 1525-1540.
"Survey of Serbian Public Opinion: November 24 – December 3, 2015. Centre for Insight in Survey Research, 2015.
Survey on Income and Living Conditions – Poverty and Social Inclusion Indicators. National Statistics Institute, 2015.
Sustainable Development: International Strategy for Disaster Reduction." In General Assembly. UN General Assembly, 2015.
"Syntez synergetychnogo upravlinnja popytom agentiv na kontent u socialnyh internet-servisah." Informatyka ta matematychni metody v modeljuvanni 5, no. 4 (2015): 330-338.
"Syria Calling: Radicalisation in Central Asia In Central Asia Briefing. Bishkek/Brussels: International Crisis Group, 2015.
The Syrian Jihad. Al-Qaeda, The Islamic State and the Evolution of an Insurgency. Oxford: Oxford University Press, 2015.
System Analysis & Design – An Object-Oriented Approach with UML. 5th ed. John Wiley & Sons, 2015.
System Modelling & Experimental Assessment of IoT Cybethreats in Future Smart Homes." In 5th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE – 2015). Sofia, Bulgaria: UNWE, 2015.
"System of Systems Cyber Effects Simulation Ontology In 2015 Winter Simulation Conference., 2015.
A Systematic Review of Approaches to Assessing Cybersecurity Awareness." Kybernetes 44, no. 4 (2015): 606-22.
"Systems Integration for Industry. Automation.com, 2015.
Tacking Stock: The Evolution, Adoption, Implementation and Evaluation of EU Counter-Terrorism Policy." In The Impact, Legitimacy and Effectiveness of EU Counter-Terrorism, 13-39. Oxon: Routledge, 2015.
"TACSO., 2015.