Biblio
Export 21441 results:
An analysis of personalized learning systems for Navy training and education settings. Monterey, California: Naval Postgraduate School, 2016.
Analysis of Sentinel-1 radiometric stability and quality for land surface applications." Remote Sensing 8, no. 5 (2016): 406.
"Analysis of the Cyber Attack on the Ukrainian Power Grid. Defense Use Case In Protocol TLP: White., 2016.
Analysis of the Development of IS (Islamic State) in Its Relation to Conflicts within OIC (Organization of Islam Countries) by Using SPSS Statistical Program." International Journal of Social Science and Humanity 6, no. 10 (2016): 799-804.
"Anomaly-Based Online Intrusion Detection System as a Senor for Cyber Security Situational Awareness System." Jyväskylä studies in computing, University of Jyväskylä 251 (2016).
"Anomaly-Based Online Intrusion Detection System as a Sensor for Cyber Security Situational Awareness System . Jyväskylä: University of Jyväskylä, Tie¬totekniikka, 2016.
"Appendix 2: History of Security Assistance and Security Cooperation." In Green Book: The Management of Security Assistance, 4-13. 1.0 ed. Washington, D.C.: Defense Institute of Security Assistance Management, 2016.
Application of a rainfall-runoff model for regional-scale flood inundation mapping for the Langat River Basin." Water Practice and Technology 11, no. 2 (2016): 373-383.
"Applied (search, engineering-geological and environmental) study aspects of active geostructures of the Ukrainian Shield and its slopes (in Ukrainian)." Ukrainian journal of the earth remote sensing 8 (2016): 1-11.
"APT Case RUAG In Technical Report. GovCERT.ch, 2016.
Arabic-Speaking Katiba Guraba Fighting Under Auspices of IK v Shame in South Aleppo. From Chechnya to Syria, 2016.
Are We Managing the Risk of Sharing Cyber Situational Awareness? A UK Public Sector Case Study." In 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA. London, UK, 2016.
"Are We Supposed to Betray Ourselves in Order to Avoid Betraying Russia?. Portal CDM, 2016.
Arming Cyberspace: The Militarization of a Virtual Domain." Global Security and Intelligence Studies 1, no. 2 (2016).
"Art Crime: Terrorists, Tomb Raiders, Forgers and Thieves. New York and Basingstoke: Palgrave Macmillan, 2016.
As Russia Hacks, Is the Best Cyber Defense a Terrifying Cyber Offense?. Investor’s Business Daily, 2016.
Assessing Cyber Security 2015." Information & Security: An International Journal 34, no. 2 (2016): 93-104.
"Assessing Maritime Power in the Asia-Pacific: The Impact of American Strategic Re-Balance In Corbett Centre for Maritime Policy Studies Series. Routledge, 2016.
"Assessing NATO Policy Alignment." In 2016 International Conference on Military Communications and Information Systems (ICMCIS). Brussels, Belgium, 2016.
Assessing State Responses to Security Threats in Central Asia." In 2016 Annual Meeting of Central Eurasian Studies Society., 2016.
"Assessing the Multinational Joint Task Force against Boko Haram." West Africa Report 19 (2016).
"Assessment of Detroit Hospital Preparedness for Response to an Improvised Nuclear Attack In College of Health Sciences. Vol. doctor. Walden University, 2016.
Assisted Content-based Labelling and Classification of Documents In Proceedings of the International Conference on Military Communications and Information System (ICMCIS)., 2016.
Augmenting combat power: Military translation in China-Burma-India Theater." Linguistica Antverpiensia, New Series: Themes in Translation Studies 15 (2016): 143-161.
"