Biblio
Export 21400 results:
Data Breaches Put Retail GCs in the Firing Line. New York: Law360, 2014.
Data classification using the Dempster–Shafer method." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517.
"David Delight Plus In Operator's Manual. Canada: Mind Alive Inc., 2014.
De economische effecten van piraterij in Zuidoost-Azië. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014.
Death from Above: Jihadist Virtual Networks Respond to Drone Strikes in Yemen. Jihadica.com, 2014.
Debating European Security and Defense Policy: Understanding the Complexity. Farnham, Burlington: Ashgate Publishing Company, 2014.
De-Conflicting Civil-Military Networks." In Network Topology in Command and Control: Organization, Operation, and Evolution. IGI Global, 2014.
"Deconstructing the Fragile City: Exploring Insecurity, Violence, and Resilience." Environment and Urbanization 26, no. 2 (2014): 345-58.
"Defense institution building: the dynamics of change in Georgia and the need for continuity of effort. Thesis : Monterey, California: Naval Postgraduate School, 2014.
Defense Policy and Reforms in Bulgaria since the End of the Cold War: A Critical Analysis." Connections: The Quarterly Journal 13, no. 2 (2014): 65-78.
"Defining a test automation system for mobile apps In Faculdade de Engenharia. Vol. Mestrado Integrado em Engenharia Informática e Computação. Universidade do Porto, 2014.
Deghosting method for multiple target tracking in a single frequency network." In 2014 International Radar Conference. Lille, France , 2014.
"Democratization’s Vicious Circle or How Georgia Failed to Change." Connections: The Quarterly Journal 13, no. 4 (2014): 67-74.
"Departments. Official site of the Ministry of Foreign Affairs of Georgia, 2014.
Deputies of the Minister of Defense. Ministry of Defense of the Republic of Armenia, 2014.
Derna, premier territoire de l’EI hors des frontières du ”califat” en Libye." Le Monde (2014).
"Designing and Building a Security Operations Centre. USA: Syngress, 2014.
Designing the Internet of Things. Chichester, West Sussex: United Kingdom: John Wiley and Sons, 2014.
Designing the Internet of Things: Part 1 — IoT Devices and Local Networks. EDN Network, 2014.
The Destabilization of Central Asia. A Repetition of the Arab Spring on Russia’s Southern Borders Is More than Possible." Voenno-promishleniy Kurier 6(524) (2014).
"Determining Employee Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q)." Computers and Security 42 (2014): 165-76.
"Deterrence, Influence, Cyber Attack, and Cyber War." New York University Journal of International Law and Politics 47, no. 2 (2014): 327-355.
"Development of Interactive Multimedia Education System (IMES) as an International Education Platform." In ustainable Living with Environmental Risks. Tokyo : Springer, 2014.
"Die Haltung der USA zur NATO-Erweiterung: Strategie, Pragmatik und Weltordnung in den Jahren nach dem Ost-West-Konflikt. Universitätsverlag Halle-Wittenberg, Halle an der Saale , 2014.
Differential Cryptoanalysis of Data Distributed Transmission System In MT&S-2013 Conference. Sofia: Defence Institute, 2014.