Biblio

Export 21362 results:
2015
Wrona, Konrad. Securing the Internet of Things a military perspective In IEEE 2nd World Forum on Internet of Things (WF-IoT). Milan, Italy, 2015.
Lu, Tianbo, Jiaxi Lin, Lingling Zhao, Yang Li, and Yong Peng. "A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields." International Journal of Security and Its Applications 9, no. 7 (2015): 1-16.
Rettman, Andrew. Security fears prompt fences on EU-Russia border. EUobserver, 2015.
Minchev, Zlatogor. Security Foundations in Cyber Space, Training Course Selected Materials., 2015.
Azim, Muzaffar, and Kazim S. Naqvi. "A Security Framework for Cloud Based Egovernance System." International Journal of Science, Technology & Management 4, no. 2 (2015).
Seismological Observatory of the Hungarian Academy of Sciences., 2015.
Ridland, Andrew. Seizing the Digital High Ground: Military Operations and Politics in the Social Media Era In Joint Forces Staff College, Joint Advanced Warfighting School. Vol. Master of Science in Joint Campaign Plannin. National Defense University, British Army, 2015.
Semtech: AN1200.22 - LoRa Modulation Basics ., 2015.
Semtech: ANNWS.01.2.1.W.SYS - LoRaWAN Network Server Demonstration: Gateway to Server Interface Definition In Revision 1.0., 2015.
Sendai Framework for Disaster Risk Reduction 2015-2030 In Third UN World Conference on Disaster Risk Reduction., 2015.
Rigante, Sara. "Sensing with Advanced Computing Technology: Fin Field-Effect Transistors with High-K Gate Stack on Bulk Silicon." ACS Nano 9, no. 15 (2015): 4872-4881.
Mandic, Danilo. Separatists, Gangsters and Other Statesmen: The State, Secession and Organized Crime in Serbia and Georgia, 1989-2012 In Graduate School of Arts & Sciences. Vol. Doctoral dissertation. Harvard University, 2015.
Nikolic, Nebojsa. "Serbian Security Perceptions: Motivations to Serve." Information & Security: An International Journal 33, no. 2 (2015): 122-137.
SHARE Foundation., 2015.
Vidino, Lorenzo. "Sharia4: From Confrontational Activism to Militancy." Perspectives on Terrorism 9, no. 2 (2015): 2-16.
Bloom, Mia. "She-hadis? Online Radicalization and the Recruitment of Women." In Violence and Gender in the Globalized World: The Intimate and the Extimate. Routledge, 2015.
Kinoshita, Tomofumi, and Tadano Masato. Shin Conmentaru Kenpo [Commentary of Japanese Constitution]. Japan Hyoron Sha via Kindle, 2015.
Lee, Rossey. "SimSpace Cyber Range." In Panel: Cyber Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research. Boston, United States, 2015.
Snarsky, Andrei, and Dmitry Lande. Simulation of complex networks: A manual. Kyiv: NTTU KPI, 2015.
Rassler, Don. "Situating the Emergence of the Islamic State of Khorasan." CTC Sentinel 8, no. 3 (2015): 7-11.
"Situation Report." Foreign Policy (2015).
al-Muhajirah, Umm Sumayyah. "Slave Girls or Prostitutes." Dabiq 9 (2015): 44-49.
Balabanov, Todor, Iliyan Zankinski, and Bozhidar Shumanov. "Slot Machines RTP Op-timization with Generic Algorithms." In Numerical Methods and Applications, 210-217. Vol. 9374. Switzerland: Springer, 2015.
Ratchev, Valeri. Slovenia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2015.
Commission, European. "Slovenia - Disaster management structure." In Vademecum – Civil protection., 2015.

Pages