Biblio

Export 21362 results:
2015
Smith, Hannah Lucinda. "Death Row Prisoner Tells of Escape from ISIS Jail." The Times (2015).
Deaths from Conflict in Northern Ireland by Year and Status In Conflict Archive on the Internet (CAIN). University of Ulster, 2015.
Dobbs, Richard, Jonathan Woetzel, Susan Lund, and Mina Mutafchieva. Debt and (not much) deleveraging. McKinsey Global Institute, 2015.
December 2015 Ukraine power grid cyberattack. Wikipedia, 2015.
Decree of the President of Ukraine of 6 May 2015 on the Decision of National Security and Defence Council "On the National Security Strategy of Ukraine" (in Ukrainian)., 2015.
Schmidhuber, Juergen. "Deep Learning in Neural Networks: An Overview." Neural Networks 61 (2015): 85-117.
Nguyen, Anh, Jason Yosinski, and Jeff Clune. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images In IEEE Conference on Computer Vision and Pattern Recognition., 2015.
DEEP Ukraine 2015 Programme Review In unclassified internal document. Political Affairs and Security Policy (PASP), 2015.
Defence Companies Anti-Corruption Index (CI) -2015 In TI Defence and Security Programme. London: Transparency International UK, 2015.
Defense expenditures data for 2014 and estimates for 2015: financial and economic data relating to NATO defense In press release., 2015.
Spear, A.D., and B. Smith. " Defining ‘Function’. ." In Third International Workshop on Definitions in Ontologies IWOOD 2015. Lisbon, Portugal, 2015.
von Lampe, Klaus. Definitions of Organized Crime In collected by Oyster Bay Conferences., 2015.
Dell Secureworks Counter Threat Unit Threat Intelligence In Threat Analysis report. TeslaCrypt Ransomware, 2015.
Buckland, Benjamin S., Fred Schreier, and Theodor H. Winkler. Democratic Governance Challenges of Cyber Security In DCAF Horizon 2015 Working Paper., 2015.
Richards, Jason. "Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security." International Affairs Review (2015).
García, Fernando Thauby. "Desarrollo de fuerzas basado en capacidades estratégicas ¿Evolución, revolución o más de lo mismo?" Revista Ensayos Militares 1, no. 14 (2015): 179-195.
Fisas, Vinceç. The Design and Architecture of Peace Processes: Lessons Learned in the Wake of Crises. Oslo: Norwegian Peacebuilding Resource Centre, 2015.
Santhi, S, and GS Sadasivam. "Design and development of compact monitoring system for disaster remote health centres." Indian J Med Microbiol [serial online] (2015): 33.
Deepa, R. Design of a clustering protocol and a Trust model for service discovery in Mobile ad hoc networks., 2015.
Designations of Foreign Terrorist Fighters In Press Release| Media Note, U.S. Department of State. Bureau of Public Affairs Department of State. The Office of Website Management, 2015.
Erickson, Anthony, Ben Shaw, Jane Murray, and Sara Branch. "Destructive Leadership: Causes, consequences and countermeasures." Organizational Dynamics 44 (2015): 266-72.
Navozenko, D.. Development of a program complex of password protection by the principle “inquiry answer”. Vol. MR Thesis [manuscript] - in Russian. Dnipropetrovsk, 2015.
Directorate for Science, Technology and Industry. The Development of Fixed Broadband Networks In OECD Digital Economy Papers ., 2015.
Shaporin, Volodymyr, and Olha Plachinda. "Development of Information Security Threat Models to Assess Harm for Assets." Technology audit and production reserves 4, no. 2(24) (2015): 10-15.
Shushpan, V.. Development of the Remote Laboratory Work on the Course “Applied cryptology”. Vol. MR Thesis [manuscript]– in Russian. Dnipropetrovsk, 2015.

Pages