Biblio

Export 21362 results:
2012
Cui, Shuguang, Zhu Han, Soummya Kar, Tung T. Kim, Vincent H. Poor, and Ali Tajer. "Coordinated Data-injection Attack and Detection in the Smart Grid: A Detailed Look at Enriching Detection Solutions." IEEE Signal Processing Magazine 29, no. 5 (2012): 106-115.
Brattberg, Erik. "Coordinating for Contingencies: Taking Stock of Post-9-11 Homeland Security Reforms." Journal of Contingencies and Crisis Management 20, no. 2 (2012): 86.
Counternarcotics Assistance: U.S. Agencies Have Allotted Billions in Andean Countries, but DOD Should Improve Its Reporting of Results. Washington, D.C.: GAO, 2012.
Hillebrand, Claudia. Counter-terrorism networks in the European Union: maintaining democratic legitimacy after 9/11., 2012.
Coverage of President Jonathan’s full speech on the occasion of the 2012 Armed Forces Remembrance Day., 2012.
The Criminal Procedural Law of Republic of Srpska. Official Gazette of Republic of Srpska, 53/12, 2012.
Dworzecki, Jacek. "Crisis Management System in Poland." The Science for Population Protection 4, no. 2 (2012).
Georgiev, Venelin. Critical Infrastructure and Supply Chain Protection: EU possible development paths and strategies In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Boyd, Danah, and Kate Crawford. "Critical questions for Big Data." Journal Information, Communication & Society 15, no. 5 (2012): 662-679.
Prezelj, Iztok, Erik Kopač, Uroš Svete, and Aleš Žiberna. "Cross-sectoral Scanning of Critical Infrastructures: From Functional Differences to Policy-relevant Similarities." Journal of Homeland Security and Emergency Management 9, no. 1 (2012).
Applebaum, Anne, and Iron Curtain. The Crushing of Eastern Europe 1944–1956. London: Allen Lane, 2012.
CS 161, Fall 2012 Computer Security., 2012.
CSTO to Work at Building Collective Air Defense System in CA. Kazinform, 2012.
Cultural Awareness Afghanistan Course. British Army ADL, 2012.
MITRE Corporation. Cyber Information-Sharing Models: An Overview., 2012.
Liu, Jing, Yang Xiao, Shuhui Li, Wei Liang, and CL Philip Chen. "Cyber Security and Privacy Issues in Smart Grids." IEEE Communications Surveys & Tutorials 14, no. 4 (2012): 981-997.
Kortjan, Noluxolo, and Rossouw von Solms. Cyber Security Education in Developing Countries: A South African Perspective In e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 119. Berlin, Heidelberg: Springer, 2012.
Sklyar, Vladimir. "Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities." Information & Security: An International Journal 28, no. 1 (2012): 98-107.
9. Noyes, Daniel. "Cyber Security Testing and Training Programs for Industrial Control Systems." In The 18th Pacific Basin Nuclear Conference (PBNC 2012), BEXCO. Busan, Korea, 2012.
Ferran, Lee, and Rhonda Schwartz. "Cyber Spy Program Flame Compromises Key Microsoft Security System." ABC News (2012).
Minchev, Zlatogor. Cyber Threats in Social Networks and Users’ Response Dynamics In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Nunez, Mariano. "Cyber-attacks on ERP systems: An analysis of the current threat landscape." Datenschutz und Datensicherheit 36, no. 9 (2012): 653-656.
Warner, Michael. "Cybersecurity: A Pre-History." Intelligence and National Security 27, no. 5 (2012): 781-799.
Aitel, Dave. "The Cybersecurity Act of 2012: Are We Smarter Than a Fifth Grader?" Huff Post Tech (2012).
Petkov, Petko. Cybersecurity: Emerging Characteristics and Impact on Defence In It4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.

Pages