Biblio
Export 21403 results:
The Future of Biothreat Governance." In Biological Threats in the 21st Century. London: Imperial College Press, 2016.
"Future Strategic Priorities, for Professional Military, Education: A Practitioner Perspective." Defence-in-Depth (2016).
"GDP per capita (current in US$) – Zimbabwe. World Bank, 2016.
Geef Bewakingsagenten Nog Meer Bevoegdheden." De Tijd (2016).
"General Challenges of Intelligence Service Reform." In Proceedings from the Third International Conference “Governance and Reform of State Security Services: Best Practices", 41-45. Kyiv, Ukraine, 2016.
"A Generic Reference Curriculum on Cybersecurity." Information & Security: An International Journal 35, no. 2 (2016): 181-184.
"Genetic algorithm for k-connected relay node placement in wireless sensor networks In Second International Conference on Computer and Communication Technologies. New Delhi, India: Springer, 2016.
The Geography of Border Militarization: Violence, Death and Health in Mexico and the United States." Journal of Latin American Geography 15, no. 1 (2016): 7-32.
"Georgia. Freedom House, 2016.
The German Initiative for Arms Control: Time for Dialogue with Russia. Ośrodek Studiów Wschodnich, 2016.
Germany’s New Problem Border: Poland. Politico, 2016.
Getting Gerasimov Right." Military Review 96, no. 1 (2016): 30-38, quote on p. 34.
"Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level." Connections: The Quarterly Journal 15, no. 3 (2016): 17-32.
"Global Security Brief #3: Climate Change Poses Greater Security Threat than Terrorism. World Watch Institute, 2016.
‘Good’ and ‘Bad’ Investments: Everything You Always Wanted to Know about Ukrainian Commanders but Were Afraid to Ask." Connections: The Quarterly Journal 15, no. 1 (2016): 57-71 .
"Google Faces EU Curbs on How It Tracks Users to Drive Adverts." Financial Times (2016).
"Governing Islam and Security in Tajikistan and Beyond: The Emergence of Transnational Authoritarian Security Governance. Vol. PhD. Exeter: United Kingdom: University of Exeter, 2016.
Government Technology., 2016.
A graph-based, semi-supervised, credit card fraud detection system In Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence. Vol. 693. Cham: Springer, 2016.
A grayscale watermark technique using sub-sampling and singular value decomposition." In International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Chennai, India , 2016.
"Growing Evidence of Islamic State in Pakistan." Terrorism Monitor 14, no. 3 (2016): 3-5.
"Growth of IT-specialists Quantity on the Separate Types of the Certification Programs. Monster Blog, 2016.
Guide to Cyber Threat Information Sharing In NIST Special Publication . Gaithersburg, MD: National Institute of Standards and Technology, 2016.