Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2017
Protocol of the special meetings No. 105
., 2017.
Google Scholar
RTF
EndNote XML
NESA
.
Public Private Partnerships (PPP) Cooperative models
. European Union Agency for Network and Information Security, 2017.
Google Scholar
RTF
EndNote XML
ENISA
.
Public Private Partnerships (PPP) – Cooperative Models
., 2017.
DOI
Google Scholar
RTF
EndNote XML
K.E., Eichensehr
.
"
Public-Private Cybersecurity
."
Texas Law Review
95, no. 3 (2017): 467-538.
Google Scholar
RTF
EndNote XML
Sinclair, Harriet
.
Putin Bans VPNs in Crackdown on Anonymous Internet Use in Russia
. Newsweek, 2017.
Google Scholar
RTF
EndNote XML
Schindler, John R.
.
Putin’s Balkan Terror Plot Exposed
. Observer, 2017.
Google Scholar
RTF
EndNote XML
Security, IBM
.
QRadar Version 7.3.1 Administration Guide
., 2017.
Google Scholar
RTF
EndNote XML
Security, IBM
.
QRadar Version 7.3.1 User guide
., 2017.
Google Scholar
RTF
EndNote XML
Poryazov, Stoyan
,
Dmytro Progonov
, and
Emiliya Saranova
.
"
Quality of Telecommunications as a Composition of Qualities of Subservices, Including Security and Trusted Third Parties
." In
2017 25th Telecommunication Forum (TELFOR)
. Belgrade, Serbia, 2017.
Google Scholar
RTF
EndNote XML
Hemmings, John
.
Quasi-alliances, managing the rise of China, and domestic politics: the US-Japan-Australia trilateral 1991-2015
. Vol. PhD thesis. The London School of Economics and Political Science (LSE), 2017.
Google Scholar
RTF
EndNote XML
Castro-Arvizu, Juan Manuel
,
Jordi Vila`-Valls
,
Ana Moragrega
,
Pau Closas
, and
Juan A. Fernandez-Rubio
.
"
Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm
."
International Journal of Distributed Sensor Networks
13, no. 8 (2017).
Google Scholar
RTF
EndNote XML
Castro-Arvizu, Juan Manuel
,
Jordi Vilà-Valls
,
Ana Moragrega
,
Pau Closas
, and
Juan A. Fernandez-Rubio
.
"
Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm
."
International Journal of Distributed Sensor Networks
13, no. 8 (2017).
Google Scholar
RTF
EndNote XML
Hidayah, Maulidia Rahmah
,
Isa Akhlis
, and
Endang Sugiharti
.
"
Recognition Number of The Vehicle Plate Using Otsu Method and K-Nearest Neighbour Classification
."
Scientific Journal of Informatics
4, no. 1 (2017).
Google Scholar
RTF
EndNote XML
Couture, Jean-René
.
"
Reconciling Operational and Financial Planning Views in a Customer-Funded Organization: Making Customer-Funding Work for NC3A
."
Information & Security: An International Journal
38 (2017): 63-69.
DOI
Google Scholar
RTF
EndNote XML
Kaplan, Jeffrey
.
"
Red Dawn is Now: Race vs. Nation and the American Election
."
Terrorism and Political Violence
29, no. 3 (2017).
Google Scholar
RTF
EndNote XML
Siudak, Piotr
.
"
Redefining cybersecurity through processual ontology of the cyberspace
."
Politeja
50, no. 14 (2017): 194-211.
Google Scholar
RTF
EndNote XML
Reform der Sicherheitsbehörden – Wie wär’s mit einem deutschen FBI?
. Spiegel online, 2017.
Google Scholar
RTF
EndNote XML
Croissant, Aurel
, and
David Kuehn
.
Reforming Civil-Military Relations in New Democracies: Democratic Control and Military Effectiveness in Comparative Perspectives
. Springer International Publishing AG , 2017.
DOI
Google Scholar
RTF
EndNote XML
Kocharyan, Hayk
.
Regional Security Dynamics: Azerbaijan
In
Analytical Bulletin: Center for Civilization and Cultural Studies
., 2017.
Google Scholar
RTF
EndNote XML
On regulation of urban development activities
In
Law of Ukraine
., 2017.
Google Scholar
RTF
EndNote XML
Mayer, Peter
,
Alexandra Kun
, and
Melanie Volkamer
.
Reliable Behavioural Factors in the Information Security Context
In
ACM International Conference Proceeding Series
. Vol. Part F1305., 2017.
DOI
Google Scholar
RTF
EndNote XML
Oyekan, John
,
Vinayak Prabhu
,
Ashutosh Tiwari
,
Vinubha Baskaran
,
Mark Burgess
, and
Rob Mcnally
.
"
Remote real-time collaboration through synchronous exchange of digitised human-workpiece interactions
."
Future Generation Computer Systems
67 (2017): 83-93.
Google Scholar
RTF
EndNote XML
Enev, E.
,
Grigor Velev
,
Nikolai Stoianov
, and
Maya Bozhilova
.
Requirements for the Sensor Platform and Network for Indoor Deployment and Exterior Based Radiofrequency Awareness
In
,” International Research Conference 105 Years Security and Defense Research
. Sofia: Bulgarian Military Academy “G. S. Rakovski ”, 2017.
Google Scholar
RTF
EndNote XML
Edgar, Thomas W.
, and
David O. Manz
.
Research Methods for Cyber Security
. Cambridge: Elsevier, 2017.
Google Scholar
RTF
EndNote XML
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU
. Brussels: European Commission, 2017.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
137
138
139
140
141
142
143
144
145
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance