Biblio
Export 21441 results:
Community Policing to Prevent Violent Extremism In FBI Law Enforcement Bulletin., 2012.
Company Survey Series: I: BAE Systems Plc." Defence and Peace Economics 23:4 (2012).
"Comparative study of digital audio steganography techniques." EURASIP Journal on Audio, Speech, and Music Processing 1 (2012): 25.
"A Comparison of Virtual Lab Solutions for Online Cyber Security Education." Communiactions of the IIMA 2, no. 4 (2012).
"Competition among Memes in a World with Limited Attention." Nature Scientific Reports 2, no. Article number: 335 (2012).
"Competitive Engagement: Upgrading America’s Influence." Small Wars Journal (2012).
"A complexity-invariant measure based on fractal dimension for time series classification." IJNCR 3, no. 3 (2012): 59-73.
"A Comprehensive Methodology for Profiling Cyber-criminals. Asia Pacific Institute of Information Technology, 2012.
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk . McGraw-Hill Osborne Media, 2012.
Computer Security Incident Handling Guide In Special Publication. National Institute of Standards and Technology (NIST), 2012.
Comunicación de Eventos de Seguridad orientada al Análisis de Riesgos Dinámico." In XII Spanish Meeting on Cryptology and Information Security (RECSI), . San Sebastián, 2012.
"Comunicazione Strategica e Strategie Communicative: le cose del Mondo tra Ignoranza e Avidita." In Studi di strategia: Guerra, politica, economia, semiotica, psicoanalisi, matematica. Egea, 2012.
"Concepto y Enfoques sobre el Análisis y la Gestión Dinámica del Riesgo en Sistemas de Información." In XII Spanish Meeting on Cryptology and Information Security (RECSI). San Sebastián, 2012.
"Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships." In Proceedings of the Fourth International Conference on Cyber Conflict (CYCON) , 429-445. Tallinn: NATO CCD COE Publications, 2012.
"Conclusions of the Council on the South Caucasus In 3149th Foreign Affairs Council Meeting. Council of the European Union, 2012.
The Concreteness of Asymmetric War: Fragments of Experience." Connections: The Quarterly Journal 11, no. 3 (2012): 21-39.
"CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: TrustCom , 2012.
Conducting Online Surveys . Thousand Oaks, CA: Sage Publications, 2012.
The Conflict Against Al Qaeda and its Affiliates: How Will It End? In paper presented at the Oxford Union. Oxford, UK: Oxford University, 2012.
Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power. New York: Crown Publishers, 2012.
Confronting the Realities of Corruption in Nigeria." In Corruption and Nigeria’s Underdevelopment, 46-67. Lagos: Serenity Press, 2012.
"Consolidated Report. Organization for Security and Cooperation in Europe, Forum for Security Co-operation, 2012.
‘A constable marine’: De strijd tegen piraterij als case voor het veranderend veiligheidsdenken, Master in de criminologische wetenschappen. Vol. Master in de criminologische wetenschappe. Universiteit Gent, 2012.