Biblio

Export 21376 results:
2016
"Advice on Ihdad." Dabiq (2016): 24-26.
Sangar, Kaneshko. "Afghanistan’s significance for Russia in the 21st Century: Interests, Perceptions and Perspectives." Politics in Central Europe 12, no. 1 (2016).
Labarre, Frederic. After Action Report to event PFP C 16411, Faculty Development (UKR DEEP) carried out 8-12 February 2016 In internal document. PfP Consortium, 2016.
Meservey, Joshua. "Al Shabab’s Lessons for ISIS: What the Fight Against the Somali Group Means for the Middle East." Foreign Affairs (2016).
McIlwraith, Douglas G., Haralambos Marmanis, and Dmitry Babenko. Algorithms of the Intelligent Web. Second ed. Shelter Island, NY: Manning, 2016.
Al-Nusra leader Jolani announces split from al-Qaeda. Al Jazeera obtains exclusive video of Abu Mohammed al-Jolani, saying group's name has changed to Jabhat Fath al Sham. Al Jazeera, 2016.
Kendall, Elisabeth. "Al-Qa’ida and Islamic State in Yemen: A Battle for Local Audiences." In Jihadism Transformed: Al-Qaeda and Islamic State's Global Battle of Ideas. London: Hurst Publishers, 2016.
al-Maqdisi, Muhammad. al-radd ’ala Abu Maysara., 2016.
Saraiva, Francisca. A Ambiguidade da(s) Narrativa(s) de Obama Sobre o Uso da Força In Working Paper. Instituto da Defesa Nacional, 2016.
Robbins, Nathaniel J.. An analysis of personalized learning systems for Navy training and education settings. Monterey, California: Naval Postgraduate School, 2016.
Hajj, Mohammad E., Nicolas Baghdadi, Mehrez Zribi, and Sebastien Angelliaume. "Analysis of Sentinel-1 radiometric stability and quality for land surface applications." Remote Sensing 8, no. 5 (2016): 406.
Lee, Robert M., Michael J. Assante, and Tim Conway. Analysis of the Cyber Attack on the Ukrainian Power Grid. Defense Use Case In Protocol TLP: White., 2016.
Oh, Seongju, Chaeyun Jung, and Taeseon Yoon. "Analysis of the Development of IS (Islamic State) in Its Relation to Conflicts within OIC (Organization of Islam Countries) by Using SPSS Statistical Program." International Journal of Social Science and Humanity 6, no. 10 (2016): 799-804.
Kokkonen, Tero. "Anomaly-Based Online Intrusion Detection System as a Senor for Cyber Security Situational Awareness System." Jyväskylä studies in computing, University of Jyväskylä 251 (2016).
Kokkonen, Tero. Anomaly-Based Online Intrusion Detection System as a Sensor for Cyber Security Situational Awareness System . Jyväskylä: University of Jyväskylä, Tie¬totekniikka, 2016.
"Appendix 2: History of Security Assistance and Security Cooperation." In Green Book: The Management of Security Assistance, 4-13. 1.0 ed. Washington, D.C.: Defense Institute of Security Assistance Management, 2016.
Mirzaei, Majid, Mina Faghih, Tan Pei Ying, Ahmed El-Shafie, Yuk Feng Huang, and Juneseok Lee. "Application of a rainfall-runoff model for regional-scale flood inundation mapping for the Langat River Basin." Water Practice and Technology 11, no. 2 (2016): 373-383.
Applied Cyber Security Course – MIT., 2016.
Verkhovtsev, Valentin, and Yuliia Yusk, iv. "Applied (search, engineering-geological and environmental) study aspects of active geostructures of the Ukrainian Shield and its slopes (in Ukrainian)." Ukrainian journal of the earth remote sensing 8 (2016): 1-11.
APT Case RUAG In Technical Report. GovCERT.ch, 2016.
Paraszczuk, Joanna. Arabic-Speaking Katiba Guraba Fighting Under Auspices of IK v Shame in South Aleppo. From Chechnya to Syria, 2016.
Davies, Michael, and Menisha Patel. "Are We Managing the Risk of Sharing Cyber Situational Awareness? A UK Public Sector Case Study." In 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA. London, UK, 2016.
Are We Supposed to Betray Ourselves in Order to Avoid Betraying Russia?. Portal CDM, 2016.
Gomez, Miguel Alberto N.. "Arming Cyberspace: The Militarization of a Virtual Domain." Global Security and Intelligence Studies 1, no. 2 (2016).
Charney, Noah. Art Crime: Terrorists, Tomb Raiders, Forgers and Thieves. New York and Basingstoke: Palgrave Macmillan, 2016.

Pages