Biblio

Export 21404 results:
2015
Kim, Inwook. Crude Security: Oil, Armament, and Alliance. Vol. Ph.D. Political Science . The George Washington University, 2015.
Cheng, Qingfeng, and Chunming Tang. "Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round." International Journal of Network Security 17, no. 6 (2015): 678-682.
D., Harinath, Ramana M.V., and Chitra B.. "Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 7 (2015): 680-6.
Howorth, Jolyon. "The CSDP without the UK: bad for Europe but even worse for Britain." In The Common Security and Defence Policy: National Perspectives. Brussels: The Royal Institute for International Relations, 2015.
CSIRTs by Country - Interactive Map. ENISA, 2015.
Mello, Alexandre, and Michael Knights. "The Cult of the Offensive: The Islamic State on Defense." CTC Sentinel 8, no. 4 (2015): 1-6.
Customer Service Catalogue, Part I: Customer Handbook. NCI Agency, 2015.
Porobić, Miralem, and Mirsad Bajraktarević. Cyber crime, pranje novca i finansijske istrage., 2015.
Cyber criminal u Bosni i Hercegovini: Od iznuda i krađa bankovnih kartica do dječije pornografije., 2015.
Kott, Alexander, Cliff Wang, and Robert F. Erbacher. "Cyber Defense and Situational Awareness." In Advances in Information Security, 111. Vol. 62. Springer, 2015.
Kolini, Farzan, and Lech Janczewski. Cyber Defense Capability Model: A Foundation Taxonomy In International Conference on Information Resources Management (CONF-IRM)., 2015.
Spanish National Cybersecurity Institute. Cyber Exercises Taxonomy., 2015.
Minchev, Zlatogor, and Georgi Dukov. "Cyber Intelligence Decision Support in the Era of Big Data." In ESGI 113 Problems & Final Reports Book, 85-92. Sofia: Fastumprint, 2015.
Rajamäki, Jyri, and Juha Knuuttila. Cyber Security and Trust Tools for Multi-agency Cooperation between Public Authorities In Proceedings of the 7th International Conference on Knowledge Management and Information Sharing - KMIS., 2015.
Muller, Lilly Pijnenburg. Cyber Security Capacity Building in Developing Countries: Challenges and Opportunities In Report. Norwegian Institute for International Affairs-NUPI, 2015.
Universities, Cyber Security C.. Cyber Security Competencies: Cyber Security Education and Research in Finnish Universities In 14th European Conference on Cyber Warfare & Security. Hatfield, UK: University of Hertfordshire, 2015.
Cyber Security. Content and Structure. City University London, 2015.
Devi, S. "Cyber Security in India: Problems and Prospects." MA Rather - IITM Journal of Management and IT (2015).
The Cyber Security Modeling Language. KTH Royal Institute of Technology, 2015.
NATO. Cyber Security Strategy Documents. Cooperative Cyber Defence Centre of Excellence (CCDCOE), 2015.
Jajodia, Sushil, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, and Cliff Wang. "Cyber Warfare: Building the Scientific Foundation." In Advances in Information Security, 3. Vol. 56., 2015.
Cyberalbania., 2015.
CyberAware: A Mobile Game-Based App for Cybersecurity Education and Awareness In 2015 International Conference on Interactive Mobile Communication Technologies and Learning, IMCL 2015., 2015.
CyberCrime.BG., 2015.
Liang, Christina Schori. Cyber-Jihad: Understanding and Countering Islamic State Propaganda In Policy Paper. Geneva: Geneva Center for Security Policy, 2015.

Pages