Biblio

Export 21362 results:
2015
Milenkoski, Aleksandr, Varco Vieira, Samuel Kounev, Alberto Avritzer, and Bryan D. Payne. "Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices." ACM Computing surveys 48, no. 1 (2015): 1-41.
Harvey, Fiona. "Everything You Need to Know about the Paris Climate Summit and UN Talks." (2015).
EvoCS Website., 2015.
"EvoCS-related Projects and Initiatives." Information & Security: An International Journal 33, no. 2 (2015): 173-174.
Prezelj, Iztok, Erik Kopač, Aleš Žiberna, Anja Kolak, and Anton Grizold. Evolutionary Reality of the Policy of Revolution in Military Affairs: Results of a Comparative Study In unpublished paper, Research Project Transforming Defence Policies in Contemporary Security Environment. Ljubljana: University of Ljubljana, 2015.
"Evolving Concept of Security: Project Overview." Information & Security: An International Journal 33, no. 2 (2015): 169-172.
Lakshika, Erandi, Michael Barlow, and Adam Easton. "Evolving High Fidelity Low Complexity Sheepdog Herding Simulations Using a Machine Learner Fitness Function Surrogate for Human Judgement." In AI 2015: Advances in Artificial Intelligence. Bernhard Pfahringer, Jochen Renz ed. Switzerland: Springer International Publishing, 2015.
Ratchev, Valeri, Vesselin Petkov, and Todor Tagarev. "Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria." Information & Security: An International Journal 33, no. 2 (2015): 83-107.
Executive Agency “Forestry“., 2015.
The Executive Branch. the White House, 2015.
Executive Environment Agency., 2015.
Newmeyer, K.. Executive Order on Cybersecurity: Billion-Dollar Bank Heist. Cyber Experts Blog at National Cybersecurity Institute., 2015.
Executive Summary and Strategic Recommendations for Non-Commissioned Officers (NCO) within the Ukrainian Arme Forces and NCO Defence Education Enhancement Program (DEEP) Team Report In Annex 1. Vol. 16. NATO-Ukraine Commission, 2015.
Evans, Brad, and Julian Reid. "Exhausted by Resilience: Response to the Commentaries." Resilience 3, no. 2 (2015): 154-159, 154.
Brzozowski, Krzysztof. "On experience of the Poland in the development of critical infrastructure protection system." In Zelena knyha z pytan zakhystu kritychoy infrastructuru, 156-158 . Kyiv: NISS, 2015.
Taylor, Jami, Richard Clerkin, Katherine Ngaruiya, and Anne-Lise Knox Velez. "An Exploratory Study of Public Service Motivation and the Institutional-Occupational Model of the Military." Armed Forces & Society 41, no. 1 (2015): 142-62.
Witek, Roger J.. Exploring 21st Century Acquisition Strategies of the Joint Strike Fighter Program. Northcentral University, 2015.
Speckhard, Anne, and Ahmet S. Yayla. "Eyewitness Accounts from Recent Defectors from Islamic State: Why They Joined, What They Saw, Why They Quit." Perspectives on Terrorism 9, no. 6 (2015): 95-118.
Velkova, Lidia. Facilitating Factors and Effects of Corruption Networks In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2015.
Nuriyev, Elkhan. Facing Difficult Choices: The South Caucasus Between Russia and the European Union. Digest RIAC, 2015.
Kroenig, Matthew. "Facing Reality: Getting NATO Ready for a New Cold War." Survival: Global Politics and Strategy 57, no. 1 (2015): 49-70.
Colby, Elbridge, and Jonathan Solomon. "Facing Russia: Conventional Defence and Deterrence in Europe." Survival 57, no. 6 (2015): 23-24.
Fact Sheet: President Xi Jinping’s State Visit to the United States. The White House, Office of the Press Secretary, 2015.
FACT SHEET: U.S. Support for Peace, Security, and Countering Violent Extremism in Africa. U.S. White House Office of the Press Secretary, 2015.
Shinga, Gladness Ntokozo. Factors Involved in Combat Readiness with Hardiness as a Mediator: An Exploratory Study In Commerce in Industrial Psychology. Vol. Masters. Stellenbosch University, 2015.

Pages