Biblio
Export 21404 results:
Framing as a Strategic Persuasive Message Tactic." In The Routledge Handbook of Strategic Communication, 285. New York, London: Routledge, Taylor and Francis Group, 2015.
" French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
"From Absent Perpetrators to Engaging Men as ‘Allies’ In workshop “Sexual Violence Against Men during Conflicts: Bridging the Gap between Theory and Practice“. Geneva: Graduate Institute of International and Development Studies, 2015.
From Here to There: NATO Burden Sharing in the Balkans and Canada In Centre for International Relations. Vol. Post-Doctoral Fellow. Queen’s University, 2015.
From Hybrid Threats to Hybrid Security Policy." Ethics and Armed Forces 2 (2015).
"From Paper State to Caliphate: The Ideology of the Islamic State . Washington, D.C.: Center for Middle East Policy at Brookings, 2015.
From Scared Amateur to Paris Slaughterer." New York Times (2015).
"From Syria to Serbia: The Migrants’ Balkan Backdoor. Middle East Eye, 2015.
Fueled by wealth, funneled by politics: the dominance of domestic drivers of arms procurement in Southeast Asia In Naval Postgraduate School. Monterey, California: Naval Postgraduate School, 2015.
Fusion Centers and Joint Terrorism Task Forces In Department of Homeland Security., 2015.
Fusion Centers: What's Working and What Isn’t. Brookings, 2015.
Fusion of Trackers on Thermal Image Sequences." In 2015 18th International Conference on Information Fusion (Fusion) . Washington, DC, 2015.
"The future of e-money laundering in the Republic of Macedonia." International Journal of Public Law and Policy 5, no. 1 (2015).
"The Future of the SCO: An Axis of Inconvenience? In ESRC Seminar Series on International Society and the Rising Powers, with a particular focus on China and India., 2015.
Future Threats and Challenges in Cyberspace In CSDM Views. Sofia: Centre for Security and Defence Management, 2015.
Fuzzy MADM Approach for Rating of Process-Based Fraud." Journal of ICT Research and Applications, Institut Teknologi Bandung 9, no. 2 (2015).
"Gangsters at Your Service: A Comparison on the Use of Criminals by Genocidal Regimesр. University of Amsterdam, 2015.
GAO Report on Combating Terrorism." Connections: The Quarterly Journal 14, no. 4 (2015): 103-120.
"Gap Analysis Report. CBRNe Integrated Response Italy, 2015.
Gartner: 21 Billion IoT Devices to Invade By 2020." Information Week (2015).
"Gender and disarmament. Reaching Critical Will, 2015.
Gender and the Security Sector: Towards a More Secure Future." Connections: The Quarterly Journal 14, no. 3 (2015): 7-30.
"Gender Equality and Good Security Sector Governance In SSR Backgrounder Series. Geneva: DCAF, 2015.
Gender Equality and Security Sector Reform In SSR Backgrounder Series. Geneva: DCAF, 2015.