Biblio

Export 21362 results:
2015
Foreign Fighters. An Updated Assessment of the Flow of Foreign Fighters into Syria and Iraq., 2015.
Foreign Fighters: An Updated Assessment of the Flow of Foreign Fighters into Syria and Iraq. New York: The Soufan Group, 2015.
Schmid, Alex P., and Judith Tinnes. Foreign (Terrorist) Fighters with IS: A European Perspective. The Hague: The International Centre for Counter-Terrorism, 2015.
Pereverzeva, Inna. Formal Development of Resilient Distributed Systems. Vol. PhD Dissertation. Turku, Finland: Abo Akademi University, Faculty of Science and Engineering, 2015.
Bonfanti, Matteo E., and Francesca Capone. "Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries." Information & Security: An International Journal 33, no. 1 (2015): 55-80.
Dolnik, Adam. "Four Myths About Ransoms." Foreign Affairs (2015).
Fourth Population Census in Latvia in 1935. CSB, 2015.
A Framework for Major Emergency Management. Appendices. Vol. 4. Inter-agency Review Working Group, 2015.
Kim, Kenneth E.. "Framing as a Strategic Persuasive Message Tactic." In The Routledge Handbook of Strategic Communication, 285. New York, London: Routledge, Taylor and Francis Group, 2015.
Botelho, Greg, and Ray Sanchez. France: Raids Kills 3 Suspects, Including 2 Wanted in Charlie Hebdo Attack. CNN, 2015.
Vitel, Philippe, and Henrik Bilddal. "French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
Becerra, Gizeh. From Absent Perpetrators to Engaging Men as ‘Allies’ In workshop “Sexual Violence Against Men during Conflicts: Bridging the Gap between Theory and Practice“. Geneva: Graduate Institute of International and Development Studies, 2015.
Zyla, Benjamin. From Here to There: NATO Burden Sharing in the Balkans and Canada In Centre for International Relations. Vol. Post-Doctoral Fellow. Queen’s University, 2015.
Mölling, Christian. "From Hybrid Threats to Hybrid Security Policy." Ethics and Armed Forces 2 (2015).
Bunzel, Cole. From Paper State to Caliphate: The Ideology of the Islamic State . Washington, D.C.: Center for Middle East Policy at Brookings, 2015.
Callimachi, Rukmini, and Jim Yardley. "From Scared Amateur to Paris Slaughterer." New York Times (2015).
Sikmic, Simona. From Syria to Serbia: The Migrants’ Balkan Backdoor. Middle East Eye, 2015.
Tan, Wah Kheng Dean. Fueled by wealth, funneled by politics: the dominance of domestic drivers of arms procurement in Southeast Asia In Naval Postgraduate School. Monterey, California: Naval Postgraduate School, 2015.
Fusion Centers and Joint Terrorism Task Forces In Department of Homeland Security., 2015.
Barnosky, Jason. Fusion Centers: What's Working and What Isn’t. Brookings, 2015.
Thomé, Sebastian, Eckart Michaelsen, Norbert Scherer-Negenborn, Klaus Jäger, and Leo Doktorski. "Fusion of Trackers on Thermal Image Sequences." In 2015 18th International Conference on Information Fusion (Fusion) . Washington, DC, 2015.
Mojsoska, Snezana. "The future of e-money laundering in the Republic of Macedonia." International Journal of Public Law and Policy 5, no. 1 (2015).
Herd, Graeme P.. The Future of the SCO: An Axis of Inconvenience? In ESRC Seminar Series on International Society and the Rising Powers, with a particular focus on China and India., 2015.
Minchev, Zlatogor. Future Threats and Challenges in Cyberspace In CSDM Views. Sofia: Centre for Security and Defence Management, 2015.
Huda, Solichul, Riyanarto Sarno, and Tohari Ahmad. "Fuzzy MADM Approach for Rating of Process-Based Fraud." Journal of ICT Research and Applications, Institut Teknologi Bandung 9, no. 2 (2015).

Pages