Biblio
Export 21441 results:
A Conceptual Study on Generic End Users Adoption of e-Government Services." International Journal on Advanced Science, Engineering and Information Technology 7, no. 3 (2017).
"Conceptualizing impact assessment as a learning process." Environmental Impact Assessment Review 62 (2017): 195-204.
"A Content Analysis of Psychological Resilience among First Responders and the General Population." SAGE Open 1 (2017).
"Controlling Chaos: How Russia Manages Its Political War in Europe In Policy Brief. London: European Council on Foreign Relations, 2017.
Converted Hindus, Engineers among 52 ISIS Terrorists Held by NIA." The Indian Express (2017).
"Convolutional neural networks for histopathology image classification: Training vs. using pre-trained networks In 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)., 2017.
Coregistration of Interferometric Stacks of Sentinel-1 TOPS Data." Geoscience and Remote Sensing Letters IEEE 14, no. 7 (2017): 1002-1006.
"Countering Terrorism in the Horn of Africa: The Role of Public Diplomacy In Institute of Diplomacy and International Studies. Vol. Master Of Arts In Diplomacy. University of Nairobi, 2017.
Counter-terrorism, Multinational Joint Task Force and the Missing Components." African Identities 15, no. 4 (2017): 428-440.
"Credit Card Detection System Based on Ridit Approach." International Journal on Advanced Science, Engineering and Information Technology 7, no. 6 (2017): 2071-2077.
"The Criminal–Terror Nexus in Chechnya: A Historical, Social, and Religious Analysis. Lexington Books, 2017.
Crimintern: How the Kremlin uses Russia’s criminal networks in Europe. European Council on Foreign Relations (ECFR), 2017.
The Crisis Management Cycle. London: Routledge, 2017.
Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study." In Advances in Intelligent Systems and Computing, 350-357. Vol. 582. Cham, Switzerlad: Springer International Publishing, 2017.
"Critical Infrastructure and Critical Information Infrastructure Protection: The Hew Frontier of EU Internal Security." In Challenges and Critiques of the EU Internal Security Strategy: Rights, Power and Security. Cambridge, 2017.
"Critical Infrastructures, Key Resources, and Key Assets." In Critical Infrastructures, Key Resources, Key Assets. Topics in Safety, Risk, Reliability and Quality, 3-37 . Vol. 34. Cham: Springer, 2017.
"The Crystallization of State Security Institutions in Tajikistan and Kyrgyzstan." In 2017 Annual Convention of Association for the Study of Nationalities. New York, NY, 2017.
"CSI: A Hybrid Deep Model for Fake News Detection In 26th ACM International Conference on Information and Knowledge Management (CIKM). Singapore, 2017.
Cultural Discourse Studies scholars as builders of a shared world." Journal of Multicultural Discourses, Special Issue: Multicultural Discourses of ‘Security’ 12, no. 4 (2017): 307-311.
"Cultural Foundations of Transparent Governments." Connections: The Quarterly Journal 16, no. 2 (2017): 81-89.
"Current and Emerging Regional Threats: Risk assessment and Cooperative approach – View from Bulgaria., 2017.
The current status of the local self-government reform in Ukraine: Preliminary conclusions and outlook." Journal of Advanced Research in Law and Economics 8, no. 1 (2017): 178-185.
"