Biblio
Export 21402 results:
Supply Chain Cyber Security – Potential Threats." Information & Security: An International Journal 29, no. 1 (2013): 51-68.
"Synthetic Biology: From Hype to Impact." Trends in Biotechnology 31, no. 3 (2013): 123-125.
" The Syrian Electronic Army Is Rewriting the Rules of War." The Conversation (2013).
"Syrian Electronic Army Turns on Assad Regime." Seczine: Security Magazine (2013).
"SysSec Deliverable D7.3 In Advanced Report on Cyberattacks on Lightweight Devices., 2013.
Systemic Aspects of Innovation and Design: The Perspective of Collaborative Networks. Cham, Switzerland: Springer, 2013.
Tallinn Manual on the International Law Applicable to Cyber Warfare . New York: Cambridge University Press, 2013.
Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.
"Tamerlan Tsarnaev Had Right-Wing Extremist Literature. BBC News, 2013.
Tamerlan Tsarnaev Was Recruited by a Georgian Fund." Izvestia (2013).
"Targeted Killings In Council on Foreign Relations, May 23, 2013., 2013.
Tashkent Strengthens Security Ties with Moscow Ahead of NATO Drawdown." Eurasia Daily Monitor 10, no. 36 (2013).
"Technically Recoverable Shale Oil and Shale Gas Resources: An Assessment of 137 Shale Formations in 41 Countries Outside the United States. U.S. Energy Information Administration (EIA), 2013.
Ten Tips for Mobile UX. Red Ant Blog, 2013.
Tensions Rise in Georgia’s Breakaway Regions. Radio Free Europe – Radio Liberty, 2013.
Terrorism and Financial Intelligence. US Department of the Treasury, 2013.
Terrorism Financing Methods: An Overview." Perspectives on Terrorism 4, no. 7 (2013): 5-26.
"Terrorist Innovation: Homegrown Terrorism and the Internet." In The Dangerous Landscape, 79-86., 2013.
"Tested by Zion: The Bush Administration and the Israeli-Palestinian Conflict. Cambridge University Press, 2013.
Testimony: AQAP’s Role in the al Qaeda Network: Statement before the House Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence." In Understanding the Threat to the Homeland from AQAP. American Enterprise Institute for Public Policy Research (AEI), 2013.
" Testing Techniques and its Challenges in a Cloud Computing Environment." The SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 1, no. 3 (2013).
"