Biblio

Export 21376 results:
2017
Weir, Matt. Hacking 400,000 passwords, or explaining to a roommate why your electricity bill went up. Defcon 17, 2017.
Joscelyn, Thomas. "Hay’at Tahrir al Sham Leader Calls for ‘Unity’ in Syrian Insurgency." FDD’s Long War Journal (2017).
Dunn, Sarah, and Sean Wilkinson. "Hazard Tolerance of Spatially Distributed Complex Networks." Reliability Engineering & System Safety 157 (2017): 1-12.
Skovgaard-Petersen, Jakob. "Heirs of Abu Bakr: On the Ideology and Conception of History in al-Qaeda and Islamic State." Connections: The Quarterly Journal 16, no. 1 (2017): 25-36.
MIC. Heisei 28 Nen Jyoho Tsushin Media no Riyou Jikan to Jyoho Koudou ni Kansuru Chosa [Research for the Length of Time and Behavior to Use Communication Media]., 2017.
Sunaert, Willem. Het militaire beleid van de VS in de Aziatisch-Pacifische regio tijdens de Obama-administratie: Een analyse a.d.h.v. het offensief realism In Politieke Wetenschappen afstudeerrichting Internation. Vol. master. Gent: Universiteit Gent, 2017.
Middleton, Bruce. A History of Cyber Security Attacks: 1980 to Present. New York: Auerbach Publications, 2017.
Pawlak, Patryk. "Horizontal Issues." In After the EU Global Strategy – Building Resilience, 17. Paris: European Union, Institute for Security Studies, 2017.
Dua, Rohan. House Panel on Pathankot Attack Puts Punjab Police SP Salwinder Singh Under Cloud. The Times of India, 2017.
Islam, Rabiul, Greg Walkerden, and Marco Amati. "Households’ Experience of Local Government during Recovery from Cyclones in Coastal Bangladesh: Resilience, Equity, and Corruption." Natural Hazards 85, no. 1 (2017): 361-378.
Balding, Christopher. "How Badly Is China’s Great Firewall Hurting the Country’s Economy?" Foreignpolicy (2017).
Major, Claudia, and Christian Mölling. How Germany Should Change Its Approach to Arms Control. Carnegie Europe, 2017.
Ruehl, John. How Is Russia so Dangerous with an Economy Smaller than Canada’s?. PoliticsMeansPolitics.com - PMP Blog!, 2017.
Perlroth, Nicole, and Scott Shane. "How Israel Caught Russian Hackers Scouring the World for U.S. Secrets." New York Times (2017).
Holloway, Michael. How Russia Weaponized Social Media in Crimea. Realcleardefense.com, 2017.
Apple, Benjamin G.. How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study. Capella University, 2017.
Skúli, Sigurður. How to generate music using a lstm neural network in keras., 2017.
How to Install Snort NIDS on Ubuntu Linux. Rapid 7 Blog, 2017.
Parsons, Kathryn, Malcolm Pattinson, Dragana Calic, Marcus Butavicius, Agata McCormac, and Tara Zwaans. "The Human Aspects of Information Security Questionnaire (HAIS-Q): Two Further Validation Studies." Computers and Security 66 (2017): 40-51.
Feher, Adrian. Hungary’s Alternative to Counter Hybrid Warfare. Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 2017.
Kavitha, M., and M. Suriakala. "Hybrid Multi-Level Credit Card Fraud Detection System by Bagging Multiple Boosted Trees (BMBT)." In IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). Coimbatore, India , 2017.
Dunay, Pàl, and Ralf Roloff. "Hybrid Threats and Strengthening Resilience on Europe’s Eastern Flank." Security Insights 16 (2017).
Danyk, Yuriy, Tamara Maliarchuk, and Chad Briggs. "Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
Razmetaeva, Yulia. Hybrid War, Information Technologies and the Legal Vacuum in the Digital World In How Deep is Your Law? Brexit. Technologies. Modern Conflicts, 5th International Conference of PhD Students and Young Researchers. Vilnius, Lithuania: Vilnius University Faculty of Law, 2017.
Tuck, Chris. Hybrid War: The Perfect Enemy In Defence-in-Depth: Research from the Defence Studies Department. London: King’s College, 2017.

Pages