Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2017
Shikfa, Abdullatif
.
"
Garbled Circuits: Optimizations and Implementations
."
Information & Security: An International Journal
37 (2017): 11-27.
DOI
Google Scholar
RTF
EndNote XML
"
‘Gazprom,’ how we miss you (‘Gazprom,’ kak ni lipsvash)
."
Capital
(2017).
Google Scholar
RTF
EndNote XML
online, Der Tagesspieg
.
Gegen Terrorismus hilft nur Besonnenheit
. Vol. February 2, 2017., 2017.
Google Scholar
RTF
EndNote XML
Parvin, Humaira
.
Gender Mainstreaming In The Police Organisations: Bangladesh Perspective
In
Law and Social Science Conference 2017
. Sydney, Australia, 2017.
Google Scholar
RTF
EndNote XML
Ribagin, Simeon
,
Panagiotis Chountas
, and
Tania Pencheva
.
"
Generalized Net Model of Muscle Pain Diagnosing
."
Lecture Notes in Artificial Intelligence
10333 (2017): 269-275.
Google Scholar
RTF
EndNote XML
A Generalized Net Model of the Neocognitron Neural Network
In
International Conference on Flexible Query Answering Systems, Lecture Notes in Computer Science
. Vol. 10333., 2017.
Google Scholar
RTF
EndNote XML
Bureva, Veselina
,
Evdokia Sotirova
,
Stanislav Popov
,
Deyan Mavrov
, and
Velichka Traneva
.
Generalized Net of Cluster Analysis Process Using STING: A Statistical Information Grid Approach to Spatial Data Mining
In
International Conference on Flexible Query Answering Systems, Lecture Notes in Computer Science
. Vol. 10333., 2017.
Google Scholar
RTF
EndNote XML
Bureva, Veselina
,
Stanislav Popov
,
Evdokia Sotirova
, and
B. Miteva
.
"
Generalized Net of the Process of Hierarchical Cluster Analysis
."
Annual of Assen Zlatarov University, Burgas, Bulgaria
XLVI, no. 1 (2017): 107-111.
Google Scholar
RTF
EndNote XML
Yang, Chaofei
,
Qing Wu
,
Hai Li
, and
Yiran Chen
.
"
Generative poisoning attack method against neural networks
."
arXiv e-prints
(2017).
Google Scholar
RTF
EndNote XML
Brownlee, Jason
.
Gentle Introduction to Models for Sequence Prediction with RNNs
., 2017.
Google Scholar
RTF
EndNote XML
Georgia ‘overrun’ by Russian troops as full-scale ground invasion begins
. Daily Mail, 2017.
Google Scholar
RTF
EndNote XML
Georgia-NATO Relations
. Embassy of Georgia, 2017.
Google Scholar
RTF
EndNote XML
Toucas, Bouris
.
The Geostrategic Importance of the Black Sea Region: A Brief History
. Center for Strategic and International Studies (CSIS), 2017.
Google Scholar
RTF
EndNote XML
McKew, Molly K.
.
"
The Gerasimov Doctrine
."
Politico
(2017).
Google Scholar
RTF
EndNote XML
Nazriev, Sairakhmon
.
Glava Hatlona obespokoen bolshim kolichestvom bokhtarcev v Sirii (Head of Hatlon is concerned with a large number of bokhtars in Syria)
. Asia-Plus, 2017.
Google Scholar
RTF
EndNote XML
Global Fire Power Index
. GlobalFirepower.com, 2017.
Google Scholar
RTF
EndNote XML
Global Peace Index 2017 Measuring Peace in a Complex World
., 2017.
Google Scholar
RTF
EndNote XML
Quisumbing, Lowell A.
.
"
Global Perspectives on Cyber security Using Latent Dirichlet Allocation Algorithm
."
International Journal of Applied Engineering Research
12, no. 20 (2017): 10310-10323.
Google Scholar
RTF
EndNote XML
Global Ransomware Attack Causes Turmoil
. BBC News Ukraine, 2017.
Google Scholar
RTF
EndNote XML
Lewis, Paul Simon
.
The Global Vulnerability Discovery and Disclosure System: A Thematic System Dynamics Approach
In
Cranfield Defence and Security
. Vol. PhD. Cranfield University, 2017.
Google Scholar
RTF
EndNote XML
Poushter, Jacob
, and
Dorothy Manevich
.
Globally, People Point to ISIS and Climate Change as Leading Security Threats
. Pew Research Center, 2017.
Google Scholar
RTF
EndNote XML
Filipenok, Artem
, and
Anjelika Basisini
.
A Group Connected to Al-Qaeda Claimed Responsibility for the Terrorist Act in the Underground
. RBK (in Russian), 2017.
Google Scholar
RTF
EndNote XML
Guarda Nacional Republicana (Portugal)
., 2017.
Google Scholar
RTF
EndNote XML
Besenyő, János
.
"
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
."
Connections: The Quarterly Journal
16, no. 3 (2017): 23-45.
DOI
Google Scholar
RTF
EndNote XML
G. Kumar, Saroj
,
Ratna Ghosh
,
Debasish Ghose
, and
A. Vengadarajan
.
"
Guidance of Seekerless Interceptors Using Innovation Covariance Based Tuning of Kalman Filters
."
Journal of Guidance, Control, and Dynamics
40, no. 3 (2017): 603-614.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
125
126
127
128
129
130
131
132
133
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance