Biblio
Export 21400 results:
Comparative Study of Cybersecurity Capability Maturity Models." In Software Process Improvement and Capability Determination, 100-113. Cham, Switzerland: Springer, 2017.
" The Competitiveness of Established Entrepreneurs in Balkan Countries." World Review of Entrepreneurship, Management and Sust. Development 13, no. 2/3 (2017): 141.
"Computational Propaganda in Ukraine: Caught between external threats and internal challenges In Working Paper 2017.9 . Oxford, UK: Project on Computational Propaganda, 2017.
Computer Simulation - Efficient Tool Of Crisis Management." In International Conference KNOWLEDGE-BASED ORGANIZATION ., 2017.
"The Concept of Building a State Critical Infrastructure Protection System in Ukraine (in Ukrainian) In Resolution of the Cabinet Ministers of Ukraine ., 2017.
Conceptual Modeling of an Information Security System and Its Validation through DLP Systems In BISEC. Belgrade, Serbia, 2017.
A Conceptual Study on Generic End Users Adoption of e-Government Services." International Journal on Advanced Science, Engineering and Information Technology 7, no. 3 (2017).
"Conceptualizing impact assessment as a learning process." Environmental Impact Assessment Review 62 (2017): 195-204.
"A Content Analysis of Psychological Resilience among First Responders and the General Population." SAGE Open 1 (2017).
"Controlling Chaos: How Russia Manages Its Political War in Europe In Policy Brief. London: European Council on Foreign Relations, 2017.
Converted Hindus, Engineers among 52 ISIS Terrorists Held by NIA." The Indian Express (2017).
"Convolutional neural networks for histopathology image classification: Training vs. using pre-trained networks In 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)., 2017.
Coregistration of Interferometric Stacks of Sentinel-1 TOPS Data." Geoscience and Remote Sensing Letters IEEE 14, no. 7 (2017): 1002-1006.
"Countering Terrorism in the Horn of Africa: The Role of Public Diplomacy In Institute of Diplomacy and International Studies. Vol. Master Of Arts In Diplomacy. University of Nairobi, 2017.
Counter-terrorism, Multinational Joint Task Force and the Missing Components." African Identities 15, no. 4 (2017): 428-440.
"Credit Card Detection System Based on Ridit Approach." International Journal on Advanced Science, Engineering and Information Technology 7, no. 6 (2017): 2071-2077.
"The Criminal–Terror Nexus in Chechnya: A Historical, Social, and Religious Analysis. Lexington Books, 2017.
Crimintern: How the Kremlin uses Russia’s criminal networks in Europe. European Council on Foreign Relations (ECFR), 2017.
The Crisis Management Cycle. London: Routledge, 2017.
Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study." In Advances in Intelligent Systems and Computing, 350-357. Vol. 582. Cham, Switzerlad: Springer International Publishing, 2017.
"Critical Infrastructure and Critical Information Infrastructure Protection: The Hew Frontier of EU Internal Security." In Challenges and Critiques of the EU Internal Security Strategy: Rights, Power and Security. Cambridge, 2017.
"Critical Infrastructures, Key Resources, and Key Assets." In Critical Infrastructures, Key Resources, Key Assets. Topics in Safety, Risk, Reliability and Quality, 3-37 . Vol. 34. Cham: Springer, 2017.
"