Biblio

Export 21409 results:
2018
Sectoral Identifications List. Office of Foreign Assets Control, U.S. Department of Treasury, 2018.
Hodges, Ben, Janusz Bugajski, and Peter Doran. Securing the Suwalki Corridor: Strategy, Statecraft, Deterrence, and Defense. Washington D.C.: Center for European Policy Analysis, 2018.
Hodges, Ben, Janusz Bugajski, and Peter B. Doran. Securing the Suwałki Corridor: Strategy, Statecraft, Deterrence, and Defense. Washington, DC: Center for European Policy Analysis, 2018.
State, Department of. Security Governance Initiative: Enhancing the transparent, accountable, and legitimate management and oversight of security policy and practice., 2018.
Yin, Lihua, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, and BinxingFang. "Security Measurement for Unknown Threats Based on Attack Preferences." Hindawi Security and Communication Networks (2018).
Bresteau, Corentin, Simon Guigui, Paul Berthier, and José M. Fernandez. "On the security of aeronautical datalink communications: Problems and solutions." In 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS). Herndon, VA, USA: IEEE, 2018.
Deliso, Chris. "Security Risks Relating to the Migrant Crisis and Interagency Cooperation: The Case of Macedonia and Bulgaria." Information & Security: An International Journal 39, no. 1 (2018): 21-27.
SEE 2018. Sofia, Bulgaria, 2018.
Mphago, Banyatsang, Dimane Mpoeleng, Shedden Masupe, and Oteng Tabona. "Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters." Information & Security: An International Journal 40, no. 2 (2018): 189-202.
Bach, Mirjana Pejić, Nikola Vlahović, and Jasmina Pivar. "Self-organizing maps for fraud profiling in leasing." In 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, Croatia , 2018.
Medvedchuk, Oksana. "Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures." Information & Security: An International Journal 40, no. 2 (2018): 129-133.
Shalamanov, Velizar. Service based organisation for security and law enforcement space enabled support., 2018.
Commission, European. Shaping Europe’s Digital Future: Public Private Partnerships., 2018.
Schwab, Klaus, and Nicholas Davis. "Shaping the Future of the Fourth Industrial Revolution." Currency (2018).
Anderson, Eva. Six Red Flags: The Most Frequent Corruption Risks in Ukraine’s Defence Procurement In Transparency International Defence and Security and Trans-parency International Ukraine., 2018.
Kil, A.N.. Small States and Cyber Security: The cases of Estonia, Lithuania, Georgia and Moldova. Vol. Bachelor., 2018.
Samberg, Andre. "Smart Solutions for Sustainable Emergency and Crisis Management." Information & Security: An International Journal 40, no. 1 (2018): 5-8.
Smartphone Factory Resets: The Benefits vs. Limitations. Blancco e-Book, 2018.
Kaya, Mehmet, Jalal Kawash, Suheil Khoury, and Min-Yuh Day. Social Network Based Big Data Analysis and Applications. Springer International Publishing, 2018.
Odunuga, Sesan Adeolu. Soft-Containment and Politics of Relevance. Conceiving a New Dimension of EU-Russia Relations In Scientific Study. GRIN Verlag, 2018.
Afeltowicz, Łukasz, and Krzysztof Pietrowicz. Solutionist interventions and their unforeseen consequences: a preliminary catalogue of often commited errors In 2018 II National Interdisciplinary Scientific Conference TechSpo’18: Power of Algorithms. Krakow, Poland , 2018.
Jordaan, E.. "South African defence policy: the rationale and impact of the SANDF’s primary role and conventional force design ." Defence Studies 18, no. 2 (2018): 188-206.
Yordanova, Gergana. "Sovereign Debt as Emerging Challenge of Hybrid Warfare." Information & Security: An International Journal 39, no. 2 (2018): 183-194.
Speech by Jeremy Wright QC to Chatham House., 2018.
Special Inspector General for Afghanistan Reconstruction. Stabilization: Lessons from the U.S. Experience in Afghanistan. SIGAR, 2018.

Pages