Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2014
Bērziņš, Jānis
.
Russia's New Generation Warfare in Ukraine: Implications for Latvian Defense Policy
. Riga: National Defence Academy, 2014.
Google Scholar
RTF
EndNote XML
Solovjev, Vladimir
, and
Nikolay Zlobin
.
Russkiy virazh. Kuda idet Rossiya? [Russian Turn: Where is Russia Going?]
. Moscow: Eksmo, 2014.
Google Scholar
RTF
EndNote XML
Motyl, Alexander
.
"
Russo-Ukrainian War Now a Reality
."
The World Post
(2014).
Google Scholar
RTF
EndNote XML
Baram, Amatzia
.
Saddam Husayn and Islam, 1968-2003. Ba’thi Iraq from Secularism to Faith
. Washington DC: Woodrow Wilson Center Press, 2014.
Google Scholar
RTF
EndNote XML
Saudi Doctor Who Joined ISIS Killed: Reports
. Al Arabiya News, 2014.
Google Scholar
RTF
EndNote XML
Zelin, Aaron
.
"
The Saudi Foreign Fighter Presence in Syria
."
CTC Sentinel
7, no. 4 (2014): 10-14.
Google Scholar
RTF
EndNote XML
Boghardt, Lori Plotkin
.
Saudi Funding of ISIS
. The Washington Institute, 2014.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Lidia Velkova
.
"
Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035
."
Journal of Defense Management
4, no. 1 (2014): 119.
DOI
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Lidia Velkova
.
"
Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035
."
Journal of Defense Management
4, no. 1 (2014).
DOI
Google Scholar
RTF
EndNote XML
"
Scots Jihadist Abdul Raqib Amin says he was recruited through the Internet and is prepared to die for his cause
."
Daily Record
(2014).
Google Scholar
RTF
EndNote XML
Second Investigation Department under the Ministry of National Defence Assessment of Threats to National Security
., 2014.
Google Scholar
RTF
EndNote XML
Liu, Yanjun
.
"
A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem
."
Journal of Information Hiding and Multimedia Signal Processing
5, no. 2 (2014).
Google Scholar
RTF
EndNote XML
Alnatheer, Mohammed A.
.
"
Secure Socket Layer (SSL) Impact on Web Server Performance
."
Journal of Advances in Computer Networks
2, no. 3 (2014): 211-217.
Google Scholar
RTF
EndNote XML
Muftić, Lisa
.
"
Securing the Border in Bosnia and Herzegovina: An Exploratory Analysis of the Impact of Training on Officers' Knowledge and Experiences Related to Sex Trafficking
."
European Journal on Criminal Policy & Research
20, no. 2 (2014): 225-241.
Google Scholar
RTF
EndNote XML
Birdisli, Fikret
.
"
Securitization of Kurdish Question in Turkey
."
International Journal of Research in Social Sciences
4, no. 2 (2014).
Google Scholar
RTF
EndNote XML
Burnashev, Rustam
.
"
Securitization of Terrorism in Weak States: The Case of Central Asia
." In
International Conference on “Prospects of EU-Central Asia Relations”
. Kazakhstan: Almaty, 2014.
Google Scholar
RTF
EndNote XML
Howorth, Jolyon
.
Security and Defence Policy in the European Union
. Basimgstoke: Palgrave MacMillan, 2014.
Google Scholar
RTF
EndNote XML
Alharbi, Nawaf
,
Maria Papadaki
, and
Paul Dowland
.
"
Security challenges of E-government adoption based on end users' perspective
." In
The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)
., 2014.
Google Scholar
RTF
EndNote XML
Vasileiadis, Alexios
.
"
Security Concerns and Trust in the Adoption of M-Commerce
."
Social Technologies
4, no. 1 (2014): 179-191.
Google Scholar
RTF
EndNote XML
Balduzzi, Marco
,
Alessandro Pasta
, and
Kyle Wilhoit
.
A security evaluation of AIS automated identification system
In
ACSAC '14, 30th Annual Computer Security Applications Conference
., 2014.
DOI
Google Scholar
RTF
EndNote XML
Alharbi, Nawaf
,
Maria Papadaki
, and
Paul Dowland
.
"
Security Factors Influencing End Users’ Adoption of E-Government
."
Journal of Internet Technology and Secured Transactions (JITST)
3, no. 4 (2014).
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
,
Oleg Illiashenko
,
Eugene Brezhnev
,
Artem Boyarchuk
, and
Vladimir Golovanevskiy
.
"
Security Informed Safety Assessment of Industrial FPGA-Based Systems
." In
Probabilistic Safety Assessment and Management PSAM 12
. Honolulu, Hawaii, 2014.
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav S.
,
Oleg A. Illiashenko
, and
Andriy A. Kovalenko
.
Security informed safety assessment of NPP I&C systems: GAP-IMECA technique
In
22nd International Conference on Nuclear Engineering ICONE22
. Prague, Czech Republic, 2014.
Google Scholar
RTF
EndNote XML
Monev, Vesselin
.
Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian)
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2014.
DOI
Google Scholar
RTF
EndNote XML
Jing, Qi
,
Athanasios V. Vasilakos
,
Jiafu Wan
,
Jingwei Lu
, and
Dechao Qiu
.
"
Security of the Internet of Things: perspectives and challenges
."
Wireless Networks
20, no. 8 (2014): 2481-2501.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
266
267
268
269
270
271
272
273
274
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance