Biblio

Export 21400 results:
2016
Shahzad, Malik, Kaleem Awan, Pete Burnap, and Omer Rana. "Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk." Elsevier, Computers & Security 57 (2016): 31-46.
Cavoukian, Kristin. Identity Gerrymandering: How the Armenian State Constructs and Controls “Its” Diaspora In Department of Political Science. Vol. degree of Doctor of Philosophy. Toronto: University of Toronto, 2016.
Striuli, Lorenzo. "Il Blurring fra Forze Militari e di Polizia: Il Caso Italiano Alla Luce del Dibattito Internazionale." Sicurezza e Scienze Sociali 1 (2016): 55-71.
van Uhm, Daan P.. The Illegal Wildlife Trade: Inside the World of Poachers, Smugglers and Traders. Springer, 2016.
Nowakowska-Krystman, Aneta, and Piotr Gawliczek. "The Image of Piracy and Maritime Terrorism – Media as the Tool for its Development." Journal of Defense Resources Management (2016).
Comeau, Kelsey Ann. Imagined Communities and the Radicalization of Second Generation Muslim Women in the United Kingdom. Ottawa: University of Ottawa, 2016.
Imarat Kavkaz. Kavkazsky Uzel [Caucasian Knot], 2016.
Androulidakis, Iosif, Vyacheslav Kharchenko, and Andriy Kovalenko. "Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training." Information & Security: An International Journal 35, no. 1 (2016): 99-120.
Qianli, Liang. "The impact of China-Central Asia relations on Xinjiang Uyghur Muslim riots ." Journal of Advances in Humanities and Social Sciences 2, no. 2 (2016): 55-75.
Tagarev, Todor. "The Impact of Corruption on National Security and Counter-corruption Strategies." In Foreword to Karin Meghesan and Valentin Stoian, Corruption and National Security: Evaluation and Response, 7-21. Bucharest: National Intelligence Academy “Michai Viteazul”, 2016.
Severinsen, Jens. In Fear of Colour Revolutions: A Neoclassical Realist Study of Russia’s Colourless Foreign Policy in the Post-Soviet Space., 2016.
Heungoup, Hans De Marie. In the Tracks of Boko Haram in Cameroon. International Crises Group Africa, 2016.
"In the Words of the Enemy." Dabiq, no. 10 (2016): 67.
Bandos, Tim. Incident Responder’s Field Guide . Waltham, MA: Digital Guardian, 2016.
Huda, Solichul, Riyanarto Sarno, and Tohari Ahmad. "Increasing Accuracy of Process-Based Fraud Detection Using a Behavior Model." International Journal of Software Engineering and Its Applications 10, no. 5 (2016): 175-188.
"Index." In Combating Transnational Terrorism, 273-277., 2016.
Naseemullah, Adnan, and Paul Staniland. "Indirect Rule and Varieties of Governance." Governance 29, no. 1 (2016): 13-30.
van Bochoven, Leendert. "Industry and Policy: Partnerships in Disruptive Times." Connections: The Quarterly Journal 15, no. 2 (2016): 19-29.
Jendoubi, Siwar. Influencers characterization in a social network for viral marketing perspectives In Computer Science, Social and Information Networks. Université Rennes, 2016.
Initiative for NATO Forces Readiness and Interoperability Partnership (NRIP) In Enclosure 2. NCI Agency, 2016.
Innocentive., 2016.
Easton, Marleen, Arne Dormaels, and Evelien De Pauw. Innovatie, Veiligheid En Technologie: Partnerschap Als Katalysator?. Mechelen: Kluwer, 2016.
Gittins, Benjamin, and Ronald Kelson. Input to the Commission on Enhancing National Cybersecurity., 2016.
Cole, Eric. Insider Threats and the Need for Fast and Directed Response—A SANS Survey . Bethesda, MD: SANS Institute, 2016.
Backman, Sarah. The institutionalization of cybersecurity management at the EU-Level: 2013-2016 In Swedish National Defence College. Vol. Master. Swedish Defence University, 2016.

Pages