Biblio

Export 21400 results:
2017
Rea-Guaman, Angel Marcelo, Tomás San Feliu, Jose A. Calvo-Manzano, and Isaac Daniel Sanchez-Garcia. "Comparative Study of Cybersecurity Capability Maturity Models." In Software Process Improvement and Capability Determination, 100-113. Cham, Switzerland: Springer, 2017.
Bojilov, Ljudmil, and Pavlina Konstantinova. A Comparison study of two approaches for determining ranked set of assignments for multitarget tracking., 2017.
Širec, Karin. "The Competitiveness of Established Entrepreneurs in Balkan Countries." World Review of Entrepreneurship, Management and Sust. Development 13, no. 2/3 (2017): 141.
Zhdanova, Mariia, and Dariya Orlova. Computational Propaganda in Ukraine: Caught between external threats and internal challenges In Working Paper 2017.9 . Oxford, UK: Project on Computational Propaganda, 2017.
Urban, Rudolf, Alena Oulehlová, and Hana Malachová. "Computer Simulation - Efficient Tool Of Crisis Management." In International Conference KNOWLEDGE-BASED ORGANIZATION ., 2017.
The Concept of Building a State Critical Infrastructure Protection System in Ukraine (in Ukrainian) In Resolution of the Cabinet Ministers of Ukraine ., 2017.
Gaydarski, I., and Zlatogor Minchev. Conceptual Modeling of an Information Security System and Its Validation through DLP Systems In BISEC. Belgrade, Serbia, 2017.
Jacob, Deden Witarsyah, Mohd Farhan M. D. Fudzee, and Mohamad Aizi Salamat. "A Conceptual Study on Generic End Users Adoption of e-Government Services." International Journal on Advanced Science, Engineering and Information Technology 7, no. 3 (2017).
Sánchez, Luis, and Ross Mitchell. "Conceptualizing impact assessment as a learning process." Environmental Impact Assessment Review 62 (2017): 195-204.
Crowe, Allison, Scott J. Glass, Mandee F. Lancaster, Justin M. Raines, and Megan R. Waggy. "A Content Analysis of Psychological Resilience among First Responders and the General Population." SAGE Open 1 (2017).
Galeotti, Mark. Controlling Chaos: How Russia Manages Its Political War in Europe In Policy Brief. London: European Council on Foreign Relations, 2017.
. "Converted Hindus, Engineers among 52 ISIS Terrorists Held by NIA." The Indian Express (2017).
Kieffer, Brady, Morteza Babaie, Shivam Kalra, and H.R.Tizhoosh. Convolutional neural networks for histopathology image classification: Training vs. using pre-trained networks In 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)., 2017.
Yague-Martinez, Nestor, Francesco De Zan, and Pau Prats-Iraola. "Coregistration of Interferometric Stacks of Sentinel-1 TOPS Data." Geoscience and Remote Sensing Letters IEEE 14, no. 7 (2017): 1002-1006.
Counter Improvised Explosive Devices - Centre Of Excelence (C-IED COE)., 2017.
Kirimi, Frank Mwiti. Countering Terrorism in the Horn of Africa: The Role of Public Diplomacy In Institute of Diplomacy and International Studies. Vol. Master Of Arts In Diplomacy. University of Nairobi, 2017.
Obamamoye, Babatunde F.. "Counter-terrorism, Multinational Joint Task Force and the Missing Components." African Identities 15, no. 4 (2017): 428-440.
Tukiman, Norbaiti, Norhaiza Ahmad, Suhana Mohamed, Zarith Sofiah Othman, CT Munirah Ni Shafee, and Zairi Ismael Rizman. "Credit Card Detection System Based on Ridit Approach." International Journal on Advanced Science, Engineering and Information Technology 7, no. 6 (2017): 2071-2077.
Meyers, Jeff. The Criminal–Terror Nexus in Chechnya: A Historical, Social, and Religious Analysis. Lexington Books, 2017.
Galeotti, Mark. Crimintern: How the Kremlin uses Russia’s criminal networks in Europe. European Council on Foreign Relations (ECFR), 2017.
Crisis Management and Disaster Response, Centre Of Excellence (CMDR COE)., 2017.
Pursiainen, Christer. The Crisis Management Cycle. London: Routledge, 2017.
Petrov, Lachezar, Nikolai Stoianov, and Todor Tagarev. "Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study." In Advances in Intelligent Systems and Computing, 350-357. Vol. 582. Cham, Switzerlad: Springer International Publishing, 2017.
Bossong, Raphael. "Critical Infrastructure and Critical Information Infrastructure Protection: The Hew Frontier of EU Internal Security." In Challenges and Critiques of the EU Internal Security Strategy: Rights, Power and Security. Cambridge, 2017.
Gheorghe, Adrian V., Dan V. Vamanu, Polinpapilinho F. Katina, and Roland Pulfer. "Critical Infrastructures, Key Resources, and Key Assets." In Critical Infrastructures, Key Resources, Key Assets. Topics in Safety, Risk, Reliability and Quality, 3-37 . Vol. 34. Cham: Springer, 2017.

Pages