Biblio
Export 21402 results:
How to Safely Flight Test a UAV Subject to Cyber-Attacks In Cyber Defence Situation Awareness Symposium (STO-MP-IST-999), ., 2014.
Human Development Index – Countries. United Nations, 2014.
Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis." In Cyber Behavior: Concepts, Methodologies, Tools, and Applications , 1260-1294 ., 2014.
"A Human Security Doctrine for Europe: The Barcelona Report of the Study Group on Europe’s Security Capabilities In Presented to EU Representative for Common and Security Policy. Study Group on Europe’s Security Capabilities, 2014.
The Huthis: From Saada to Sanaa. International Crisis Group, 2014.
A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems." Journal of Computational Intelligence and Electronic Systems 3, no. 1–6 (2014).
"The Hybrid Threats: The New Challenge to the Security Sector (in Bulgarian)." Military Journal 121, no. 4 (2014): 111-117.
"’Hybrid War’ as a key tool for Russian geostrategy of revenge." Strategic Priorities 4 (2014): 5.
""Hybrid Warfare: Briefing to the Subcommittee on Terrorism, Unconventional Threats and Capabilities." Committee on Armed Services, House of Representatives, 2014.
The Hybrid 'Wars': Reflection and an Integral Component of the Global Security Environment (in Bulgarian)." Military Journal 121, no. 4 (2014): 102-110.
"I’ll Do Jail, Says Nun, 84, Who Broke into Nuclear Warhead Site." The Times (2014): 34.
"Identifying Instability Pockets. Fort Leavenworth, Kansas: School of Advanced Military Studies, United States Army Command and General Staff College, 2014.
Identifying Mafia Bosses from Meeting Attendance." In Networks and Network Analysis for Defence and Security, 27-48. Cham: Springer International Publishing Switzerland, 2014.
"Impact of mobile Internet on people in Kenya, Nigeria and South Africa. Device Research, 2014.
The Impact of the Internet on Global Networks: A Perspective." In User-Centric Technology Design for Nonprofit and Civic Engagements, 25-40. Vol. 9. Springer, Cham: Public Administration and Information Technology, 2014.
"Impediments to Information and Knowledge Sharing Within Policing." SAGE Open 4, no. 1 (2014).
"Implementation of E-Government services Analysis of factors in case of Ukraine. Vol. Master. Linnaeus University, 2014.
Improved migration for mobile computing in distributed networks." Computer Standards & Interfaces 36, no. 3 (2014): 577-584 .
"Improvements Required for Operational and Tactical Intelligence Sharing in NATO." Defence Against Terrorism Review 6, no. 1 (2014): 47-62.
"In a Time of Crisis, Ukrainians Abroad Unite." Forbes (2014).
"In Sochi, Putin reached agreement with Egyptian president to increase agricultural shipment to Russia by 30%. Vol. 12 August 2014. Newsru.com, 2014.
In the Wake of Cyber Damage: Significant Decisions in Cybersecurity 2013-2014." Business Lawyer 70, no. 1 (2014).
"