Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2016
EU Strategic Communication to Counteract Anti-EU Propaganda by Third Parties, European Parliament Resolution of 23 November 2016 on EU Strategic Communication to Counteract Propaganda against It by Third Parties (2016/ 2030(INI))
. European Parliament, 2016.
Google Scholar
RTF
EndNote XML
EU strengthens response to hybrid threats
. Brussels: European Commission, 2016.
Google Scholar
RTF
EndNote XML
EU strengthens response to hybrid threats to bolster security
. European Union External Action, 2016.
Google Scholar
RTF
EndNote XML
Emmott, Robin
, and
Dmitry Solovyov
.
EU urges more countries to impose sanctions on Russia over Crimea
. Reuters, 2016.
Google Scholar
RTF
EndNote XML
Eucom announces European reassurance initiative implementation plan
. Eucom Live, 2016.
Google Scholar
RTF
EndNote XML
EUFOR Libya
., 2016.
Google Scholar
RTF
EndNote XML
Bugajski, Janusz
, and
Margarita Assenova
.
Eurasian Disunion: Russia's Vulnerable Flanks
. The Jamestown Foundation, 2016.
Google Scholar
RTF
EndNote XML
Hill, Charles
.
"
A Euro Border Guard and Hybrid Warfare. An Art Theft Perspective: Human Dimensions and a Moral Imperative
."
Connections: The Quarterly Journal
15, no. 4 (2016): 111-120.
DOI
Google Scholar
RTF
EndNote XML
Cunningham, Finian
.
Europe Revolts Against Russian Sanctions
. Strategic Culture Foundation, 2016.
Google Scholar
RTF
EndNote XML
Europe to US: Ignore Donald Trump, We Need NATO
. Politico, 2016.
Google Scholar
RTF
EndNote XML
Libel, Tamir
.
European Military Culture and Security Governance: Soldiers, Scholars and National Defence Universities
. Routledge, 2016.
Google Scholar
RTF
EndNote XML
Cancian, Mark F.
, and
Lisa Sawyer Samp
.
The European Reassurance Initiative
. Center for Strategic and International Studies, 2016.
Google Scholar
RTF
EndNote XML
Ilves, Luukas
,
Timothy Evans
,
Frank Cilluffo
, and
Alec Nadeau
.
"
European Union and NATO Global Cybersecurity Challenges: A Way Forward
."
PRISM
6, no. 2 (2016).
Google Scholar
RTF
EndNote XML
Aydin, Aydın
.
"
Europe-Russia Battle in Ukraine: Reflections of This Struggle on Political Attitudes of Turkey
."
Journal of International Social Research
9, no. 42 (2016): 449-457.
Google Scholar
RTF
EndNote XML
Vieth, Kilian
.
Europol Policing the Web: Internet Content & Counter-Radicalization – An Interpretive Policy Analysis Approach
In
Dual degree program
. Vol. Political Science & European Affairs. Berlin : Otto-Suhr-Institut, FU Berlin , 2016.
Google Scholar
RTF
EndNote XML
Commission, European
.
EU-U.S. Privacy Shield: stronger protection for transatlantic data flows
. Brussels, 2016.
Google Scholar
RTF
EndNote XML
"
Evading IDS, Firewalls and Detecting Honeypots
." In
Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures
, 77-134. Second ed. Boston, USA: Cengage Learning, 2016.
Google Scholar
RTF
EndNote XML
Okolo, Nkiru Benjamin
.
Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria
. Northcentral University, 2016.
Google Scholar
RTF
EndNote XML
Maksimovic, Mirjana
, and
Vladimir Milosevic
.
"
Evaluating the optimal sensor placement for smoke detection
."
Yugoslav journal of operations research
26, no. 1 (2016): 33-50.
Google Scholar
RTF
EndNote XML
Engin, Murat
.
Evaluation of Compulsory Military Service in Turkey Using a Population Representation Model
. Vol. Master’s thesis. Monterey, California: Naval Postgraduate School, 2016.
Google Scholar
RTF
EndNote XML
Mahmud, Mohammad Sultan
,
Phayung Meesad
, and
Sunantha Sodsee
.
"
An evaluation of computational intelligence in credit card fraud detection
." In
International Computer Science and Engineering Conference (ICSEC)
. Chiang Mai, Thailand , 2016.
Google Scholar
RTF
EndNote XML
Venant, Rémi
,
Philippe Vidal
, and
Julien Broisin
.
"
Evaluation of Learner Performance during Practical Activities: an Experimentation in Computer Education
." In
16th International Conference on Advanced Learning Technologies (ICALT)
. Austin, TX, USA: IEEE, 2016.
Google Scholar
RTF
EndNote XML
Amman, Jordan
,
Sattar J. Aboud
, and
Mohammad A. Al-Fayoumi
.
E-voting scheme using bilinear pairing
In
7th International Conference on Computer Science and Information Technology (CSIT) (2016)
., 2016.
Google Scholar
RTF
EndNote XML
Alymbaeva, Aida
, and
Todor Tagarev
.
The Experience of the Kyrgyz Republic in Crisis Management: Lessons for the Future
. Geneva – Bishkek: DCAF, 2016.
Google Scholar
RTF
EndNote XML
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
155
156
157
158
159
160
161
162
163
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance