Biblio

Export 21409 results:
2017
Sharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69-94.
Tahrir al-Sham: Al-Qaeda’s Latest Incarnation in Syria In BBC Monitoring. BBC News, 2017.
Pion-Berlin, D.. "A Tale of Two Missions: Mexican Military Police Patrols Versus High-Value Targeted Operations." Armed Forces & Society 43, no. 1 (2017).
Schmitt, Michael N.. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Second edition. Cambridge, UK: Cambridge University Press, 2017.
Ishiwatari, Mikio, and Kenichi Tsukahara. Technical Note on the Estimation of Infrastructure Demand for Flood Control In Bridging the Infrastructure Gap in Asia, ADB-JICA Joint Side Event at the 50th Annual Meeting of the ADB Board of Governors. Yokohama, 2017.
Bogdanova, Ana, Jugoslav Achkoski, and Jurij Tasic. "Telemedicine in Macedonia–Smart I (Eye) Advisory Rescue System." In Benchmarking Telemedicine: Improving Health Security in the Balkans. IOS Press, 2017.
Karnitschnig, Matthew. Terror sparks call to centralize German police powers. Politico, 2017.
Terroranschlag erneut einziges Thema im Innenausschuss. Berliner Morgenpost online, 2017.
Terrorfall Amri: Ausschuss im neuen NRW-Landtag nahm Arbeit auf. Westdeutsche Zeitung online, 2017.
Terrorfall Amri – Sonderermittler entlastet die Behörden in NRW. Der Tagesspiegel online, 2017.
Opper, Timothy. Terrorism and Transnational Organized Crime: Iran’s Islamic Revolutionary Guard Corps (Irgc) - Dual Threat to Canada’s National Security In School of Criminology and Criminal Justice. Vol. Master of Arts (Criminal Justice) ., 2017.
Tichý, Lukáš, and Jan Eichler. "Terrorist Attacks on the Energy Sector: The Case of Al Qaeda and the Islamic State." Studies in Conflict & Terrorism (2017).
Zalubovin, Igor. The Terrorist’s Ghost: Chasing Akbar Dzhalilov Who Blew Up the Underground. Snob (in Russian), 2017.
Sotiriadis, Stelios, Andrus Lehmets, Euripides G. M. Petrakis, and Nik Bessis. Testing Cloud Services Using the TestCast Tool In Information Technology - New Generations, 14th International Conference on Information Technology., 2017.
Thales has welcomed 9 startups within its Cyber@Station F programme. Thales, 2017.
Counter Threat Unit Research Team. Threat Analysis report on WannaCry., 2017.
ENISA. Threat-Landscape-Report 2017. Heraklion: European Union Agency for Network and Information Security, 2017.
Bergmane, Una. The Three Little Oligarchs: Latvia’s Corruption Scandal. Foreign Policy Research Institute, 2017.
Macnair, Logan, and Richard Frank. "“To My Brothers in the West . . .”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center." Journal of Contemporary Criminal Justice 33, no. 3 (2017): 234-253.
Shalamanov, Velizar. "Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience." Information & Security: An International Journal 38 (2017): 5-10.
Stoianov, Nikolai, Maya Bozhilova, and Grigor Velev. Towards Security Requirements of the SPIDER Projec In Scientific Conference with International Participation on Cyber security in the Information Society. Shumen, Bulgaria, 2017.
Rajamäki, Jyri, and Rauno Pirinen. Towards the cyber security paradigm of eHealth: Resilience and design aspects In Proceedings of the 1st International Conference on Applied Mathematics and Computer Science. Vol. 1836. Melville: AIP Publishing, 2017.
W., Buchanan, Thuemmler C., Prajapati B., Spyra G., Smales A., Thuemmler C., and Bai C.. "Towards Trust and Governance in Integrated Health and Social Care Platforms." In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, 219-231. Switzerland: Springer, 2017.
Tchesnokov, Serguei. "Traffic Pattern Analysis Inside Out." ScienceSoft (2017).
Swami, Praveen. "Train Suspect Shot Dead Was Named Last Year by Member of IS-Inspired Cell, Police Lost Trail." The Indian Express (2017).

Pages