Biblio

Export 21404 results:
2015
Government Security Centre., 2015.
Buesnel, Guy. GPS Spoofing Is Now A Real Threat – Here’s What Manufacturers of GPS Devices Need to Know. Spirent blog, 2015.
Command, United States Spe. "The Gray Zone." In White paper. Vol. 1., 2015.
Kharchenko, Vyacheslav, Oleg Illiashenko, Chris Phillips, and Jüri Vain. Green Computing within the Context of Educational and Research Projects In Recent Advances in Computer Science, Proceedings of the 19th International Conference on Computers (part of CSCC'15). Zakynthos Island, Greece, 2015.
Biriukov, Dmytro, Sergiy Kondratov, Oleg Nasvit, and Oleksandr Sukhodolia. The Green Paper on Critical Infrastructure Protection: Analytical report. Kyiv: NISS, 2015.
Biryukov, D.S., and S.I. Kondratov. Green Paper on Critical Infrastructure Protection in Ukraine: Collected Materials from International Expert Meetings . Kyiv: National Institute for Strategic Studies, 2015.
Moras, Julien, Jean Dezert, and Benjamin Pannetier. Grid Occupancy Estimation for Environment Perception Based on Belief Functions and PCR6 In Signal Processing, Sensor/Information Fusion, and Target Recognition XXIV. Vol. 9474. Baltimore, Maryland, United States, 2015.
Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly, 2015.
Purdy, Mark, and Ladan Davarzani. The Growth Game-Changer: How the Industrial Internet of Things can drive progress and prosperity. Accenture Strategy, 2015.
Gun Homicide and Violent Crime. Pew Research Center’s Social and Demographic Trends, 2015.
Coker, Margaret, Danny Yadron, and Damian Palette. "Hacker Killed by Drone Was Islamic State’s ‘Secret Weapon’." Wall Street Journal (2015).
Greenberg, Andy. Hackers Remotely Kill a Jeep on the Highway – With Me in It. Wired, 2015.
"The Hand That Feeds: Kiev Now Unable to Survive without Extremist Support." Sputnik (2015).
Yu, Tianlong, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, and Chenren Xu. Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM)., 2015.
Dolinskiy, Alexey. "Hard thinking about Russian soft power: What to do next?" Russia Direct (2015).
Duggan, Patrick. "Harnessing Cyber-technology’s Human Potential." Special Warfare 28, no. 4 (2015): 15.
Herbst, John E.. "Here’s How to Make Sense of the Violence in Western Ukraine: Follow the Money." Atlantic Council (2015).
Mygal, Valeriy, Andrii But, A. Phomin, and I. Klimenko. "Hereditary Functional Individuality of Semiconductor Sensors." Functional Materials 22, no. 3 (2015): 387-391.
Sly, Liz. "The hidden hand behind the Islamic State militants? Saddam Hussein’s." Washington Post (2015).
Muhajirah, Umm Asiya. "Hijra – My Story." Al-Risalah 1 (2015).
Aiyadurai, Yoganand. Hippocratic data sharing in e-government space with contract management In Information Technology in the Department of Information Technology Faculty of Accounting and Informatics. Vol. Magister Technologiae. Durban University of Technology, 2015.
Pawlak, A., H.D. Jørgensen, L.M. Camarinha-Matos, F. Bénaben, and W Picard. "Holistic Design of Collaborative Net-works of Design Engineering Organizations." In Risks and Resilience of Collaborative Networks, IFIP Advances in Information and Communication Technology. Vol. 463., 2015.
Hollande says Paris attacks an ‘act of war’ by Islamic State group. France 24, 2015.
Mullins, Sam. ‘Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.
Mullins, Sam. Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.

Pages