Biblio

Export 21402 results:
2015
Vitel, Philippe, and Henrik Bilddal. "French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
Becerra, Gizeh. From Absent Perpetrators to Engaging Men as ‘Allies’ In workshop “Sexual Violence Against Men during Conflicts: Bridging the Gap between Theory and Practice“. Geneva: Graduate Institute of International and Development Studies, 2015.
Zyla, Benjamin. From Here to There: NATO Burden Sharing in the Balkans and Canada In Centre for International Relations. Vol. Post-Doctoral Fellow. Queen’s University, 2015.
Mölling, Christian. "From Hybrid Threats to Hybrid Security Policy." Ethics and Armed Forces 2 (2015).
Bunzel, Cole. From Paper State to Caliphate: The Ideology of the Islamic State . Washington, D.C.: Center for Middle East Policy at Brookings, 2015.
Callimachi, Rukmini, and Jim Yardley. "From Scared Amateur to Paris Slaughterer." New York Times (2015).
Sikmic, Simona. From Syria to Serbia: The Migrants’ Balkan Backdoor. Middle East Eye, 2015.
Tan, Wah Kheng Dean. Fueled by wealth, funneled by politics: the dominance of domestic drivers of arms procurement in Southeast Asia In Naval Postgraduate School. Monterey, California: Naval Postgraduate School, 2015.
Fusion Centers and Joint Terrorism Task Forces In Department of Homeland Security., 2015.
Barnosky, Jason. Fusion Centers: What's Working and What Isn’t. Brookings, 2015.
Thomé, Sebastian, Eckart Michaelsen, Norbert Scherer-Negenborn, Klaus Jäger, and Leo Doktorski. "Fusion of Trackers on Thermal Image Sequences." In 2015 18th International Conference on Information Fusion (Fusion) . Washington, DC, 2015.
Mojsoska, Snezana. "The future of e-money laundering in the Republic of Macedonia." International Journal of Public Law and Policy 5, no. 1 (2015).
Herd, Graeme P.. The Future of the SCO: An Axis of Inconvenience? In ESRC Seminar Series on International Society and the Rising Powers, with a particular focus on China and India., 2015.
Minchev, Zlatogor. Future Threats and Challenges in Cyberspace In CSDM Views. Sofia: Centre for Security and Defence Management, 2015.
Huda, Solichul, Riyanarto Sarno, and Tohari Ahmad. "Fuzzy MADM Approach for Rating of Process-Based Fraud." Journal of ICT Research and Applications, Institut Teknologi Bandung 9, no. 2 (2015).
Thijs, F. Gangsters at Your Service: A Comparison on the Use of Criminals by Genocidal Regimesр. University of Amsterdam, 2015.
Actions, Foreign Terrorist. "GAO Report on Combating Terrorism." Connections: The Quarterly Journal 14, no. 4 (2015): 103-120.
Gap Analysis Report. CBRNe Integrated Response Italy, 2015.
Eddy, Nathan. "Gartner: 21 Billion IoT Devices to Invade By 2020." Information Week (2015).
Gender and disarmament. Reaching Critical Will, 2015.
Arostegui, J.D. Julie L.. "Gender and the Security Sector: Towards a More Secure Future." Connections: The Quarterly Journal 14, no. 3 (2015): 7-30.
Huhtanen, Heather, and Veerle Triquet. Gender Equality and Good Security Sector Governance In SSR Backgrounder Series. Geneva: DCAF, 2015.
Triquet, Veerle, and Callum Watson. Gender Equality and Security Sector Reform In SSR Backgrounder Series. Geneva: DCAF, 2015.
Tomić, Ankica. "Gender Mainstreaming of the Security Sector in Bosnia and Herzegovina: From the Policy Papers to Reality." Connections: The Quarterly Journal 14, no. 3 (2015): 87-102.
Gender statistics., 2015.

Pages