Biblio

Export 21398 results:
2018
Sukhankin, Sergey. "Russian PMCs, War Veterans Running ‘Patriotic’ Youth Camps in the Balkans (Part One)." Eurasia Daily Monitor 15, no. 151 (2018).
Sukhankin, Sergey. "Russian PMCs, War Veterans Running ‘Patriotic’ Youth Camps in the Balkans (Part Two) ." Eurasia Daily Monitor 15, no. 155 (2018).
Russian Priests: Radev is a Cowardly Puppet of the West in a Third-rate Country (Ruski sveshtenici: Radev e strahliva marionetka na Zapada v tretorazredna strana). Dnevnik, 2018.
Russian woman charged with spying in the US. BBC News, 2018.
Seldin, Jeff. Russia's 2016 Election Meddling More Comprehensive than Realized. Global Security, 2018.
Bērzin̦a, Ieva, Māris Cepurītis, Diana Kaljula, and Ivo Jurvee. Russia's Footprint in the Nordic-Baltic Information Environment. Riga: NATO Strategic Centre of Excellence, 2018.
Kofman, Michael. Russia's Great Power Raiding Strategy. War on the Rocks, 2018.
Saeima bans Latvian children's participation in paramilitary camps in Russia. The Baltic Times, 2018.
Nurzyńska, Anna. "The safety of a human behind the dangers of the 21st century." World Scientific News: An International Scientific Journal 105 (2018): 99-109.
SBU protiv NABU Sytnika predosteregli ot unichtojeniya dokumentov (СБУ против НАБУ: Сытника предостерегли от уничтожения документов). Liga News, 2018.
Oliveira, Diego F. M., Kevin S. Chan, and Edson D. Leonel. "Scaling Invariance in a Social Network with Limited Attention and Innovation." Physics Letters A 382, no. 47 (2018): 3376-3380.
Russo, Enrico, Gabriele Costa, and Alessandro Armando. Scenario Design and Validation for Next Generation Cyber Ranges In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). Cambridge, MA, USA, 2018.
Chertov, Oleg, Taras Rudnyk, and Oleksandr Palchenko. Search of phony accounts on Facebook. Ukrainian case In International Conference on Military Communications and Information Systems (ICMCIS2018). Warsaw, Poland: IEEE Xplore, 2018.
Ardic, Zeynep. Searching for Transitional Justice Mechanisms in the Kurdish Question in Turkey: addressing violations of social, economic and cultural rights. Vol. PhD thesis. University of Sussex, 2018.
Sectoral Identifications List. Office of Foreign Assets Control, U.S. Department of Treasury, 2018.
Hodges, Ben, Janusz Bugajski, and Peter Doran. Securing the Suwalki Corridor: Strategy, Statecraft, Deterrence, and Defense. Washington D.C.: Center for European Policy Analysis, 2018.
Hodges, Ben, Janusz Bugajski, and Peter B. Doran. Securing the Suwałki Corridor: Strategy, Statecraft, Deterrence, and Defense. Washington, DC: Center for European Policy Analysis, 2018.
State, Department of. Security Governance Initiative: Enhancing the transparent, accountable, and legitimate management and oversight of security policy and practice., 2018.
Yin, Lihua, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, and BinxingFang. "Security Measurement for Unknown Threats Based on Attack Preferences." Hindawi Security and Communication Networks (2018).
Bresteau, Corentin, Simon Guigui, Paul Berthier, and José M. Fernandez. "On the security of aeronautical datalink communications: Problems and solutions." In 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS). Herndon, VA, USA: IEEE, 2018.
Deliso, Chris. "Security Risks Relating to the Migrant Crisis and Interagency Cooperation: The Case of Macedonia and Bulgaria." Information & Security: An International Journal 39, no. 1 (2018): 21-27.
SEE 2018. Sofia, Bulgaria, 2018.
Mphago, Banyatsang, Dimane Mpoeleng, Shedden Masupe, and Oteng Tabona. "Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters." Information & Security: An International Journal 40, no. 2 (2018): 189-202.
Bach, Mirjana Pejić, Nikola Vlahović, and Jasmina Pivar. "Self-organizing maps for fraud profiling in leasing." In 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, Croatia , 2018.
Medvedchuk, Oksana. "Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures." Information & Security: An International Journal 40, no. 2 (2018): 129-133.

Pages