Biblio

Export 21402 results:
2014
Heiges, Mike, Rob Bever, and Kyle Carnahan. How to Safely Flight Test a UAV Subject to Cyber-Attacks In Cyber Defence Situation Awareness Symposium (STO-MP-IST-999), ., 2014.
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. HP News, 2014.
Human Development Index – Countries. United Nations, 2014.
Hai-Jew, S.. "Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis." In Cyber Behavior: Concepts, Methodologies, Tools, and Applications , 1260-1294 ., 2014.
Solana, Javier. A Human Security Doctrine for Europe: The Barcelona Report of the Study Group on Europe’s Security Capabilities In Presented to EU Representative for Common and Security Policy. Study Group on Europe’s Security Capabilities, 2014.
The Huthis: From Saada to Sanaa. International Crisis Group, 2014.
Malekpour, Milad, Maryam Khademi, and Behrouz Minae-Bidgoli. "A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems." Journal of Computational Intelligence and Electronic Systems 3, no. 1–6 (2014).
Hristov, Neno. "The Hybrid Threats: The New Challenge to the Security Sector (in Bulgarian)." Military Journal 121, no. 4 (2014): 111-117.
Horbulin, Volodymyr. "’Hybrid War’ as a key tool for Russian geostrategy of revenge." Strategic Priorities 4 (2014): 5.
"Hybrid Warfare: Briefing to the Subcommittee on Terrorism, Unconventional Threats and Capabilities." Committee on Armed Services, House of Representatives, 2014.
Lyutskanov, Emil. "The Hybrid 'Wars': Reflection and an Integral Component of the Global Security Environment (in Bulgarian)." Military Journal 121, no. 4 (2014): 102-110.
Bhatt, Devika. "I’ll Do Jail, Says Nun, 84, Who Broke into Nuclear Warhead Site." The Times (2014): 34.
Ideas of Erasian Integration of South Ossetia and Reunification with North Ossetia Discussed in Vladikavkaz (Idei evraziiskoi integratsii Yuzhnoi Ossetii i vossoedineniya s Severnoi Ossetiei obsuzhdayut vo Vladikavkaze). IA Regnum, 2014.
Karim, Iskander. Identifying Instability Pockets. Fort Leavenworth, Kansas: School of Advanced Military Studies, United States Army Command and General Staff College, 2014.
Calderoni, Francesco. "Identifying Mafia Bosses from Meeting Attendance." In Networks and Network Analysis for Defence and Security, 27-48. Cham: Springer International Publishing Switzerland, 2014.
IEC 62264-1-2014 Enterprise-control system integration - Part 1: Models and terminology., 2014.
Impact of mobile Internet on people in Kenya, Nigeria and South Africa. Device Research, 2014.
Virkar, Shefali. "The Impact of the Internet on Global Networks: A Perspective." In User-Centric Technology Design for Nonprofit and Civic Engagements, 25-40. Vol. 9. Springer, Cham: Public Administration and Information Technology, 2014.
Abrahamson, Douglas Edward, and Jane Goodman-Delahunty. "Impediments to Information and Knowledge Sharing Within Policing." SAGE Open 4, no. 1 (2014).
Nesterenko, Mykola. Implementation of E-Government services Analysis of factors in case of Ukraine. Vol. Master. Linnaeus University, 2014.
Hsu, Chien-Lung, and Yu-Li Lin. "Improved migration for mobile computing in distributed networks." Computer Standards & Interfaces 36, no. 3 (2014): 577-584 .
Webb, Stewart. "Improvements Required for Operational and Tactical Intelligence Sharing in NATO." Defence Against Terrorism Review 6, no. 1 (2014): 47-62.
Soldak, Katya. "In a Time of Crisis, Ukrainians Abroad Unite." Forbes (2014).
In Sochi, Putin reached agreement with Egyptian president to increase agricultural shipment to Russia by 30%. Vol. 12 August 2014. Newsru.com, 2014.
Trope, R. L., and L. L. Hantover. "In the Wake of Cyber Damage: Significant Decisions in Cybersecurity 2013-2014." Business Lawyer 70, no. 1 (2014).

Pages