Biblio
Export 21461 results:
Filters: [Clear All Filters]
A critical analysis of the role of the internet in the preparation and planning of acts of terrorism." Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide 4, no. 2 (2015): 121-133.
"Critical infrastructure protection – Romanian contributions and experiences (in Ukrainian)." In Zelena knyha z pytan zakhystu kritychoy infrastructuru, 93-106 . Kyiv: NISS, 2015.
" Critical Infrastructure Protection: the Challenges of Establishing Interagency Cooperation (in Ukrainian)." In Zelena knyha z pytan zakhystu kritychoy infrastructuru, 158-161. Kyiv: NISS, 2015.
"Croatia Moves Refugees to Hungarian Border – As It Happened." The Guardian (2015).
"Cross-Domain Coercion: The Current Russian Art of Strategy. Institute of International Relations, 2015.
Crude Oil Prices Down Sharply in Fourth Quarter of 2014. U.S. Energy Information Administration, 2015.
Crude Security: Oil, Armament, and Alliance. Vol. Ph.D. Political Science . The George Washington University, 2015.
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round." International Journal of Network Security 17, no. 6 (2015): 678-682.
"Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 7 (2015): 680-6.
"The CSDP without the UK: bad for Europe but even worse for Britain." In The Common Security and Defence Policy: National Perspectives. Brussels: The Royal Institute for International Relations, 2015.
"CSIRTs by Country - Interactive Map. ENISA, 2015.
The Cult of the Offensive: The Islamic State on Defense." CTC Sentinel 8, no. 4 (2015): 1-6.
"Customer Service Catalogue, Part I: Customer Handbook. NCI Agency, 2015.
Cyber criminal u Bosni i Hercegovini: Od iznuda i krađa bankovnih kartica do dječije pornografije., 2015.
Cyber Defense and Situational Awareness." In Advances in Information Security, 111. Vol. 62. Springer, 2015.
"Cyber Defense Capability Model: A Foundation Taxonomy In International Conference on Information Resources Management (CONF-IRM)., 2015.
Cyber Exercises Taxonomy., 2015.
Cyber Intelligence Decision Support in the Era of Big Data." In ESGI 113 Problems & Final Reports Book, 85-92. Sofia: Fastumprint, 2015.
"Cyber Security and Trust Tools for Multi-agency Cooperation between Public Authorities In Proceedings of the 7th International Conference on Knowledge Management and Information Sharing - KMIS., 2015.
Cyber Security Capacity Building in Developing Countries: Challenges and Opportunities In Report. Norwegian Institute for International Affairs-NUPI, 2015.
Cyber Security Competencies: Cyber Security Education and Research in Finnish Universities In 14th European Conference on Cyber Warfare & Security. Hatfield, UK: University of Hertfordshire, 2015.
Cyber Security. Content and Structure. City University London, 2015.
Cyber Security in India: Problems and Prospects." MA Rather - IITM Journal of Management and IT (2015).
"