Biblio
Export 21441 results:
A Comprehensive Strategy for Combating Terrorism." In Combating Transnational Terrorism, 253-270. Sofia: Procon, 2016.
"Concept of the Development of the Security and Defense Sector of Ukraine. President of Ukraine, 2016.
Confidence of the University Youth in Armed Forces and Information Sources." In Current Topics in Social Sciences, 474-483. Sofia: St. Kliment Ohridski University Press, 2016.
"Connected devices create millions of cyber security weak spots." Financial Times (2016).
"The Construction of an IT Infrastructure for Knowledge Management." Asian Academy of Management Journal 21, no. 1 (2016).
"The Contemporary Spectrum of Conflict. Protracted, Gray Zone, Ambiguous, and Hybrid Modes of War. Washington, D.C.: The Heritage Foundation, 2016.
Context Assumptions for Threat Assessment Systems." In Context-Enhanced Information Fusion. Advances in Computer Vision and Pattern Recognition. Cham: Springer, 2016.
"Cooperación en seguridad: Narcotráfico en la Cuenca del Amazonas. Vol. Licenciatura en Relaciones Internacionales. Universidad Empresarial Siglo 21, 2016.
Core Competencies of Piracy and Maritime Terrorism." Journal of Defense Resources Management (2016).
"Correlation Analysis Using Global Dataset of Events, Location and Tone." In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC). Changsha, China, 2016.
"Council Decision (EU) 2016/1351 of 4 August 2016 concerning the Staff Regulations of the European Defence Agency. European Defence Agency, 2016.
Council Decision (EU) 2016/1353 of 4 August 2016 concerning the financial rules of the European Defence Agency. European Defence Agency, 2016.
Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk. Washington D.C.: US GAO, 2016.
Counterfeiting. Encyclopedia Britannica Online, 2016.
Countering Putin’s Nuclear-backed Aggression with a Continuous Nuclear-Capable Bomber Presence In Technical Report. Newport Ri, United States: Naval War College, 2016.
Countering Radicalization And Its Impact On National Security In East Africa: The Case For The Diplomatic Approach In Kenya In College Of Humanities And Social Sciences, Institute Of Diplomacy And International Studies. Vol. Masters Of Arts In Diplomacy. University Of Nairobi, 2016.
Countering Violent Extremism." In Combating Transnational Terrorism, 199-216. Sofia: Procon, 2016.
"Counter-Terrorist Financing." In Combating Transnational Terrorism, 217-234. Sofia: Procon, 2016.
"Criminal Pasts, Terrorist Futures: European Jihadists and the New Crime-Terror Nexus. Vol. 5. London: International Centre for the Study of Radicalisation, 2016.
Criminal violence and state responses in the Northern Triangle. Monterey, California: Naval Postgraduate School, 2016.
Crisis Management Organization: Building Governance Capacity and Legitimacy." Public Administration Review 76, no. 6 (2016): 887-897.
"Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study In Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX. Brunow, Poland, 2016.
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." In IEEE 36th International Conference on Distributed Computing Systems., 2016.
"CSS Study: Learning from Disaster Events and Exercises in Civil protection Organizations In Risk and Resilience Reports. Zurich: Center for Security Studies, 2016.
Cyber Awareness, Strategies, and Practice." Information & Security: An International Journal 34, no. 1 (2016): 5-6.
"