Biblio

Export 21404 results:
2015
Van Vlasselaer, Véronique, Cristián Bravo, Olivier Caelen, Tina Eliassi-Rad, Leman Akoglu, Monique Snoeck, and Bart Baesens. "APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions." Decision Support Systems 75 (2015): 38-48.
Taylor, Guy. "Apocalypse Prophecies Drive Islamic State Strategy, Recruiting Efforts." Washington Times (2015).
AQAP and AQIM Give Scathing Rebuke of IS in Joint Statement. SITE Intelligence, 2015.
Kaufman, Sarah, and Vladi Vovcuk. "Are the Russians Losing Interest in Ukraine?" The Week (2015).
Mileham, Patrick. "Armed Forces Officership: An International Military Capability." In Routledge Handbook of Military Ethics. Routledge, 2015.
Voetelink, Joop. "Armed Forces Participating in Crisis Management Operations." In Status of Forces: Criminal Jurisdiction over Military Personnel Abroad, 55-83. The Hague: T.M.C. Asser Press, 2015.
Jha, C. Armed Forces Special Power Act: A Draconian Law?. India: Vij Books India Pvt Ltd, 2015.
Hill, Fiona, Kemal Kirişci, and Andrew Moffatt. Armenia and Turkey: From Normalization to Reconciliation. Brookings Institution, 2015.
Armenia Joins Eurasia Union. Radio Azatutyun, Radio Free Europe/Radio Liberty , 2015.
Army Design Methodology. Headquarters, Department of the Army, 2015.
Around 8,000 Ukrainian officers sided with enemy in Crimea, Donbas, Interfax Ukraine. Kyiv Post, 2015.
Abbass, Hussein A.. "The Art of Red Teaming." In Computational Red Teaming. Cham : Springer, 2015.
Schmitt, Eric, and David E. Sanger. "As U.S. Focuses on ISIS and the Taliban, Al Qaeda Reemerges." NY Times (2015).
Asha’s Story. Peace Direct, 2015.
Ionescu, Nicolae, and Aurelian Penescu. "Aspects of Winter Wheat Physiology Treated with Herbicides." Agriculture and Agricultural Science Procedia 6 (2015): 52-57.
Georgiev, Venelin. Assessing and managing security risk. Sofia: Avangard, 2015.
Zhang, Su, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, and Jing Jin. "Assessing Attack Surface with Component- Based Package Dependency." In Network and System Security. Lecture Notes in Computer Science. Vol. 9408. Springer, Cham: NSS, 2015.
Sweijs, Tim, and Milos Jovanovic. "Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1 (2015): 5-9.
Frinking, Erik, and Michel Rademaker. Assessing Cyber Security. The Hague, Netherlands: Hague Centre for Strategic Studies, 2015.
Gehem, Maarten, Artur Ursanov, Erik Frinking, and Michel Rademaker. Assessing Cyber Security: A meta-analysis of threats, trends and responses to cyber attacks. The Hague, Netherlands: Hague Centre for Strategic Studies, 2015.
Swejis, Tim, Joshua Polchar, Boaz Manger, Willem Oosterveld, and Laurin Nabuko Hainy. Assessing Evolving Concepts of Security In Deliverable 3.1, EvoCS Consortium., 2015.
"Assessing the Implications of Advances in Science and Technology for the BTW 2016." In IAP Global Security Working Group Meeting. Warsaw, Poland: Polish Academy of Sciences, 2015.
Nesser, Thomas Hegghammer. "Assessing the Islamic State’s Commitment to Attacking the West." Perspectives on Terrorism 9, no. 4 (2015): 14-30.
Dimov, Stefan L.. Assessing the threat of islamically motivated terrorism in Bulgaria. Monterey, California: Naval Postgraduate School, 2015.
Romaniuk, Peter. "Assessing Violent Extremism: The case of Burkina Faso." In Countering Violent Extremism: Developing an evidence-base for policy and practice. Perth, Western Australia: Curtin University, 2015.

Pages