Biblio
Export 21410 results:
Analysis: Why AQAP quickly denied any connection to mosque attacks." The Long War Journal (2015).
"Anatomy of an info-war: How Russia’s propaganda machine works, and how to counter it. Central European Policy Institute, 2015.
Anonymity vs. Security: The Right Balance for the Smart Grid." Communications of the Association for Information Systems 36, no. Article 2 (2015): 23-32.
"Anti-Terror Grid in Deep Freeze. India Today, 2015.
APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions." Decision Support Systems 75 (2015): 38-48.
"Apocalypse Prophecies Drive Islamic State Strategy, Recruiting Efforts." Washington Times (2015).
"AQAP and AQIM Give Scathing Rebuke of IS in Joint Statement. SITE Intelligence, 2015.
Are the Russians Losing Interest in Ukraine?" The Week (2015).
"Armed Forces Officership: An International Military Capability." In Routledge Handbook of Military Ethics. Routledge, 2015.
"Armed Forces Participating in Crisis Management Operations." In Status of Forces: Criminal Jurisdiction over Military Personnel Abroad, 55-83. The Hague: T.M.C. Asser Press, 2015.
"Armed Forces Special Power Act: A Draconian Law?. India: Vij Books India Pvt Ltd, 2015.
Armenia and Turkey: From Normalization to Reconciliation. Brookings Institution, 2015.
Armenia Joins Eurasia Union. Radio Azatutyun, Radio Free Europe/Radio Liberty , 2015.
Army Design Methodology. Headquarters, Department of the Army, 2015.
Around 8,000 Ukrainian officers sided with enemy in Crimea, Donbas, Interfax Ukraine. Kyiv Post, 2015.
The Art of Red Teaming." In Computational Red Teaming. Cham : Springer, 2015.
"As U.S. Focuses on ISIS and the Taliban, Al Qaeda Reemerges." NY Times (2015).
"Asha’s Story. Peace Direct, 2015.
Aspects of Winter Wheat Physiology Treated with Herbicides." Agriculture and Agricultural Science Procedia 6 (2015): 52-57.
"Assessing and managing security risk. Sofia: Avangard, 2015.
Assessing Attack Surface with Component- Based Package Dependency." In Network and System Security. Lecture Notes in Computer Science. Vol. 9408. Springer, Cham: NSS, 2015.
"Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1 (2015): 5-9.
"