Biblio

Export 21376 results:
2015
Kharchenko, Vyacheslav, Oleg Illiashenko, Chris Phillips, and Jüri Vain. Green Computing within the Context of Educational and Research Projects In Recent Advances in Computer Science, Proceedings of the 19th International Conference on Computers (part of CSCC'15). Zakynthos Island, Greece, 2015.
Biriukov, Dmytro, Sergiy Kondratov, Oleg Nasvit, and Oleksandr Sukhodolia. The Green Paper on Critical Infrastructure Protection: Analytical report. Kyiv: NISS, 2015.
Biryukov, D.S., and S.I. Kondratov. Green Paper on Critical Infrastructure Protection in Ukraine: Collected Materials from International Expert Meetings . Kyiv: National Institute for Strategic Studies, 2015.
Moras, Julien, Jean Dezert, and Benjamin Pannetier. Grid Occupancy Estimation for Environment Perception Based on Belief Functions and PCR6 In Signal Processing, Sensor/Information Fusion, and Target Recognition XXIV. Vol. 9474. Baltimore, Maryland, United States, 2015.
Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly, 2015.
Purdy, Mark, and Ladan Davarzani. The Growth Game-Changer: How the Industrial Internet of Things can drive progress and prosperity. Accenture Strategy, 2015.
Gun Homicide and Violent Crime. Pew Research Center’s Social and Demographic Trends, 2015.
Coker, Margaret, Danny Yadron, and Damian Palette. "Hacker Killed by Drone Was Islamic State’s ‘Secret Weapon’." Wall Street Journal (2015).
Greenberg, Andy. Hackers Remotely Kill a Jeep on the Highway – With Me in It. Wired, 2015.
"The Hand That Feeds: Kiev Now Unable to Survive without Extremist Support." Sputnik (2015).
Yu, Tianlong, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, and Chenren Xu. Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM)., 2015.
Dolinskiy, Alexey. "Hard thinking about Russian soft power: What to do next?" Russia Direct (2015).
Duggan, Patrick. "Harnessing Cyber-technology’s Human Potential." Special Warfare 28, no. 4 (2015): 15.
Herbst, John E.. "Here’s How to Make Sense of the Violence in Western Ukraine: Follow the Money." Atlantic Council (2015).
Mygal, Valeriy, Andrii But, A. Phomin, and I. Klimenko. "Hereditary Functional Individuality of Semiconductor Sensors." Functional Materials 22, no. 3 (2015): 387-391.
Sly, Liz. "The hidden hand behind the Islamic State militants? Saddam Hussein’s." Washington Post (2015).
Muhajirah, Umm Asiya. "Hijra – My Story." Al-Risalah 1 (2015).
Aiyadurai, Yoganand. Hippocratic data sharing in e-government space with contract management In Information Technology in the Department of Information Technology Faculty of Accounting and Informatics. Vol. Magister Technologiae. Durban University of Technology, 2015.
Pawlak, A., H.D. Jørgensen, L.M. Camarinha-Matos, F. Bénaben, and W Picard. "Holistic Design of Collaborative Net-works of Design Engineering Organizations." In Risks and Resilience of Collaborative Networks, IFIP Advances in Information and Communication Technology. Vol. 463., 2015.
Hollande says Paris attacks an ‘act of war’ by Islamic State group. France 24, 2015.
Mullins, Sam. ‘Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.
Mullins, Sam. Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.
Li, Xingan, Henry Joutsijoki, Jorma Laurikkala, Markku Siermala, and Martti Juhola. "Homicide and Its Social Context: Analysis Using the Self-Organizing Map." Applied Artificial Intelligence An International Journal 29, no. 4 (2015).
Higgins, Kelly Jackson. Hospital Medical Devices Used As Weapons In Cyberattacks. DARKreading, 2015.
Gertz, Bill. "House Adds Funds to Counter Russian Info War." Washington Times (2015).

Pages