Biblio

Export 21376 results:
2016
Nikolic, Nebojsa. "On Methodological Approaches to Defence Sector Reform." In XVI International Symposium 2016 SYMORG., 2016.
Molodetska-Hrynchuk, Kateryna. "Metodyka vyjavlennja manipuljacij suspilnoju dumkoju u socialnyh internet-servisah." Informacijna bezpeka 3, no. 23 (2016): 80-92.
Hurst, William, Fosso Wamba Samuel, Huang Jen-Fa, and Wen-Piao Lin. "Micro-CI: A Critical Systems Testbed for Cyber-Security Research." In EMERGING 2016., 2016.
Hurst, W., N. Shone, Q. Shi, and B. Bazli. "MICRO-CI: A Testbed for Cyber-Security Research." In EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence., 2016.
Heiskanen, Markus. "Militarization of Border Control – Why Not?" In Armed Forces for 2020 and Beyond, 35-51. Wien, 2016.
Sivertun, Ake. "Military–technological aspects of the Swedish mission to Afghanistan." In The Swedish Presence in Afghanistan: Security and Defence Transformation., 2016.
Virkar, Shefali. "The Mirror Has Two Faces: Terrorist Use of the Internet and the Challenges of Governing Cyberspace." In National Security and Counterintelligence in the Era of Cyber Espionage., 2016.
Mission Description., 2016.
Yusof, I., and A.S.K. Pathan. "Mitigating cross-site scripting attacks with a content security policy." Computer 3, no. 49, (3) (2016): 56-63.
MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled. Malware Must Die, 2016.
Adlakh, Mona. "Mobile Commerce Security and Its Prevention." In Securing Transactions and Payment Systems for M-Commerce. IGI Global, 2016.
Orozobekova, Almakan. "The Mobilization and Recruitment of Foreign Fighters: The Case of Islamic State, 2012–2014." Connections: The Quarterly Journal 15, no. 3 (2016): 83-100.
Kokkonen, Tero, Jari Hautamäki, Jarmo Siltanen, and Timo Hämäläinen. "Model for Sharing the Information of Cyber Security Situation Awareness between Organizations." In 23rd International Conference on Telecommunications. Thessaloniki, Greece, 2016.
Bernardi, Simona, Lacramioara Dranca, and José Merseguer. "A model-driven approach to survivability requirements assessment for critical systems." Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability 230, no. 5 (2016): 485-501.
Panayotova, Galina, Georgi Dimitrov, Pavel Petrov, and Bychkov Os. Modeling and data processing of information systems In 016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR). Lodz, Poland, 2016.
Panayotova, Galina, and Georgi Dimitrov. Modeling and dataprocessing of information systems In Artificial Intelligence and Pattern Recognition (AIPR), International Conference, IEEE Xplore., 2016.
Tollefsen, Tore, and Giorgia Cinelli. "Moderated discussion: Progress on European Geogenic Radon Mapping." In Moderated panel discussion during the 13th International Workshop on the Geological Aspects of Radon Risk Mapping (15-16 September 2016). Prague:, 2016.
Pocheptsov, Georgii. Modern information wars. Kyiv: Kyiv-Mohyla Academy, 2016.
Romani, Alessia. Money laundering and financial crimes: a comparison between criminal and legal firms In Dipartimento di Scienze Economiche. Vol. Magistrale in Business Administration. Universita‟ Degli Studi Di Padova , 2016.
Recknagel, Charles. Montenegrin Opposition Calls Charges of Plot to Kill Djukanovic ‘Fabricated’. Radio Free Europe, 2016.
Montenegro is in the Process of Joining NATO., 2016.
Vasovic, Aleksandar. Montenegro PM Accuses Russia of Financing anti-NATO Campaign. Reuters, 2016.
Montenegro Says Russian ‘Nationalists Were Behind Plot to Kill Djukanovic. Radio Free Europe, 2016.
Harris, Richard. "More Data Will Be Created in 2017 than the Previous 5,000 Years of Humanity." App Developer Magazine (2016).
Pifer, Steven. Mr. Lavrov, Russia, and the Budapest Memorandum. Brookings, 2016.

Pages