Biblio

Export 21407 results:
2017
Sottilare, Robert A., Rodney A. Long, and Benjamin S. Goldberg. Enhancing the Experience Application Program Interface (xAPI) to Improve Domain Competency Modeling for Adaptive Instruction In Fourth (2017) ACM Conference on Learning @ Scale. Cambridge, Massachusetts, USA , 2017.
ENISA Threat Landscape Report 2016. Heraklion: European Union Agency for Network and Information Security, 2017.
Kazi, Abdul Ghafoor, Rosman Bin Md Yusoff, Fadillah Binti Ismail, Erni Munastiwi, and Muzammil Muhammad K. Arisar. "Entrepreneurship and Livelihood Restoration at Sindh Pakistan: Mediating Role of Firm Performance." Advanced Science Letters 23, no. 9 (2017): 8138-8143.
Shevchenko, Viktor, and Alina Shevchenko. The Epidemiological Approach to Information Security Incidents Forecasting for Decision Making Systems In 13-th International Conference Perspective Technologies and Methods in MEMS Design (MEMSTECH). Polyana, UKRAINE, 2017.
Esri Story Map 2017 Terrorist Attacks., 2017.
Work, Robert. Establishment of an Algorithmic Warfare Cross-Functional Team (Project Maven). govexec, 2017.
Rogers, Peter. "The Etymology and Genealogy of a Contested Concept." In The Routledge Handbook of International Resilience, 13-25. Abingdon, UK: Routledge, 2017.
Danielyan, Emil. EU Reveals Landmark Deal With Armenia. Radio Azatutyun, Radio Free Europe/Radio Liberty, 2017.
Emmery, Chris. Euclidean vs. Cosine Distance., 2017.
EUCOM), United States Eur. European Reassurance Initiative (ERI) Fact Sheet., 2017.
Richards, Melvin S.. Evaluating the Resources, Rural Law Enforcement Management Needs to Counter Violent Extremist Behaviors. Colorado Technical University, 2017.
Finley, IB. "An Evaluation of National Cybersecurity Policies for the Maritime Transportation System." (2017).
Lewis, Jeffrey. "Everyone Fails Nuclear Weapons Tests Sometimes." Foreign Policy (2017).
Zhou, Kuang, Arnaud Martin, and Quan Pan. "Evidence combination for a large number of sources." In 20th International Conference on Information Fusion (Fusion). Xi'an, China , 2017.
Wickramarathne, Thanuka. "Evidence updating for stream-processing in big-data: Robust conditioning in soft and hard data fusion environments." In 20th International Conference on Information Fusion (Fusion). Xi'an, China , 2017.
Hartmann, Uwe. The Evolution of the Hybrid Threat, and Resilience as a Countermeasure In Research Paper. Rome: NATO Defense College, 2017.
Heydarian, Richard Javad. "Evolving Philippines-U.S.-China Strategic Triangle: International and Domestic Drivers." Asian Politics & Policy 9, no. 4 (2017): 564-582.
Ponder, Sarah, and Jonathan Matusit. "Examining ISIS Online Recruitment through Relational Development Theory." Connections: The Quarterly Journal 16, no. 4 (2017): 35-50.
Kleinschmit, Stephen W., and Vickie Edwards. "Examining the Ethics of Government-Organized Nongovernmental Organizations (GONGOs)." Journal Public Integrity 19, no. 5 (2017): 529-546.
Ex-Bundesanwalt Jost wird Sonderermittler im Fall Amri. BerlinOnline, 2017.
Exercises: Archives., 2017.
Harr, Scott J.. "Expanding Tolstoy and Shrinking Dostoyevsky. How Russian Actions in the Information Space are Inverting Doctrinal Paradigms of Warfare." Military Review 97, no. 5 (2017): 39-48.
Falcone, Alberto, Alfredo Garro, S.J.E. Taylor, A. Anagnostou, N.R. Chaudhry, and O. Salah. "Experiences in simplifying distributed simulation: The HLA development kit frame-work." Journal of Simulation 11 (2017): 208-227.
Heirbrant, Jonas. ‘Experts’, forgeries and feigned objectivity: How Russian disinformation tools influenced the no-campaign of the Dutch referendum on the EU-Ukraine Association Agreement In Russian and Eurasian Studies. Vol. Master. Leiden University, 2017.
Carr, Chadd. Exploration into the Types, Operational Areas, and Peripheral Resources of Cyber Threat Intelligence: An Expert Panel Delphi Study. Northcentral University, 2017.

Pages