Biblio

Export 21362 results:
2015
Zhang, Su, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, and Jing Jin. "Assessing Attack Surface with Component- Based Package Dependency." In Network and System Security. Lecture Notes in Computer Science. Vol. 9408. Springer, Cham: NSS, 2015.
Sweijs, Tim, and Milos Jovanovic. "Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1 (2015): 5-9.
Frinking, Erik, and Michel Rademaker. Assessing Cyber Security. The Hague, Netherlands: Hague Centre for Strategic Studies, 2015.
Gehem, Maarten, Artur Ursanov, Erik Frinking, and Michel Rademaker. Assessing Cyber Security: A meta-analysis of threats, trends and responses to cyber attacks. The Hague, Netherlands: Hague Centre for Strategic Studies, 2015.
Swejis, Tim, Joshua Polchar, Boaz Manger, Willem Oosterveld, and Laurin Nabuko Hainy. Assessing Evolving Concepts of Security In Deliverable 3.1, EvoCS Consortium., 2015.
"Assessing the Implications of Advances in Science and Technology for the BTW 2016." In IAP Global Security Working Group Meeting. Warsaw, Poland: Polish Academy of Sciences, 2015.
Nesser, Thomas Hegghammer. "Assessing the Islamic State’s Commitment to Attacking the West." Perspectives on Terrorism 9, no. 4 (2015): 14-30.
Dimov, Stefan L.. Assessing the threat of islamically motivated terrorism in Bulgaria. Monterey, California: Naval Postgraduate School, 2015.
Romaniuk, Peter. "Assessing Violent Extremism: The case of Burkina Faso." In Countering Violent Extremism: Developing an evidence-base for policy and practice. Perth, Western Australia: Curtin University, 2015.
Antwi, R. An Assessment of a Re-Emerging Russia and the Ukrainian Crisis. University of Ghana, 2015.
Chirenda, Tatenda Grace, Chandra Sunitha Srinivas, and Roman Tandlich. "Assessment of the City of Harare’s capacity to treat municipal water and conduct the necessary analyses on microbial water quality, the use of alternative water sources and its impact on public health." Water SA 41, no. 5 (2015): 691-697.
ASTRA Winter-storm study., 2015.
Duff-Brown, Beth. "At Stanford, Secretary of Defense Ashton Carter unveils cyber strategy, calls for renewed partnership with Silicon Valley." Stanford News (2015).
Rid, Thomas, and Ben Buchanan. "Attributing Cyber Attacks." Journal of Strategic Studies 38 , no. 32 (2015).
Rid, Thomas, and Ben Buchanan. "Attributing Cyber Attacks." Journal of Strategic Studies 38 , no. 30 (2015).
Rid, Thomas, and Ben Buchanan. "Attributing Cyber Attacks." Journal of Strategic Studies 38, no. 1-2 (2015).
Minchev, Z., E. Kelevedjiev, and P. Gatev. Audio-Visual Entrainment Influence on Postural Dynamics In Proceedings of International Workshop ‘Posture, Balance and the Brain’. Thessaloniki, Greece, 2015.
Obydenkova, Anastassia, and Alexander Libman. Autocratic and Democratic External Influences in Post-Soviet Eurasia. Farnham: Ashgate, 2015.
Ghasempour, Sina. Automatic License Plate Recognition (ALPR). Vol. Master of Science in Electrical and Electronic Engineering. Gazimağusa, North Cyprus: Eastern Mediterranean University, 2015.
Palmer, Diego A. Ruiz. Back to the Future? Russia’s Hybrid Warfare, Revolutions in Military Affairs, and Cold War Comparisons. NATO Defense College, 2015.
BaltFloodCombat organisation., 2015.
Rhodes, Matthew, and Ruta Buneviciute. "Baltic and Central European Security After the Ukraine Crisis." Security Insights 11 (2015).
Banking on Mobility over a Generation In Special Rapporteur’s June 2015 report on the EU. UN, 2015.
Waszczykowski, Witold. "The Battle For The Hearts and Minds: Countering Propaganda Attacks Against the Euro-Atlantic Community." In NATO Parliamentary Assembly, Committee on the Civil Dimension of Security., 2015.
Bayesian network and simulation software for risk analysis and decision support AgenaRisk., 2015.

Pages