Biblio
Export 21404 results:
United Nations General Assembly Resolution A/69/80. United Nations, 2014.
Unmasking the Social Engineering. The Human Element of Security. John Wiley & Sons, Inc., 2014.
Unveiling Barriers and Enablers of Risk Management in Interoperability Efforts." In 47th Hawaii International Conference on System Sciences. Waikoloa, HI, USA : IEEE, 2014.
"Update on the National Cyber Security Programme In Session 2014-15. UK Cabinet Office, 2014.
Uranium Ores of Ukraine: Geology, Production, and RAW management (in Ukrainian). Kiev: Naukova Dumka, 2014.
"US and EU hinder Russian actions in preventing global threats." FOCUS News Agency (2014).
U.S. Counterinsurgency: Spoilers of Instability. Carlisle Barracks, Pennsylvania: United States Army, U.S. Army War College, 2014.
U.S. Energy: Overview and Key Statistics In Congressional Research Service., 2014.
US Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern., 2014.
The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affair 27, no. 2 (2014).
"The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affairs 27, no. 2 (2014): 226-245.
"US Strategy to Fight Terrorism Increasingly Uses Proxies." New York Times (2014).
"US Unsettled by China’s Three Warfares Strategy: Pentagon Report." The Sydney Morning Herald (2014).
"Using Self-Organizing Maps for Binary Classification With Highly Imbalanced Datasets." International Journal of Numerical Analysis and Modeling, Series B 5, no. 3 (2014): 238-254.
"Uzbekistan: Karimov’s Power Unshatterable. Ferghana Information Agency, 2014.
Uzbekistan: No Transition yet Visible. Moscow: The Carnegie Moscow Center, 2014.
Uzbekistan Presents Army Development Strategy. Trend, 2014.
The Value Improvement in Education Service by Grasping the Value Acceptance State with ICT Utilized Education Environment." In Human Interface and the Management of Information. Information and Knowledge in Applications and Services. HIMI 2014. Lecture Notes in Computer Science. Vol. 8522. Cham: Springer, 2014.
"Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies." Information Management and Computer Security 22, no. 1 (2014): 42-75.
"Violence Against Women: Intimate Partner and Sexual Violence Against Women. World Health Organization, 2014.
Violent and Non-Violent Extremism: Two Sides of the Same Coin?. The Hague: International Centre for Counter-Terrorism, 2014.
Vision 2020: Bulgaria in NATO and the European Defence . Sofia: Ministry of Defence, 2014.
Vision-based moving pedestrian recognition from imprecise and uncertain data. Université de Technologie de Compiègne, 2014.
Visualizing Big Data with Compressed Score Plots: Approach and Research Challenges." Chemometrics and Intelligent Laboratory Systems 135 (2014): 110-125.
"