Biblio

Export 21393 results:
2015
Tagarev, Todor, and Valeri Ratchev. Scenario and ambitions for managing a trans-border political-military crisis: Implications for Bulgaria’s Defence Policy In CSDM Views., 2015.
Ferrari, Andrea C.. "Science and Technology Roadmap for Graphene, Related Two-dimensional Crystals, and Hybrid Systems." Nanoscale 7, no. 11 (2015).
Gartrell, Adam, Natalie O’Brien, and Michael Bachelard. "Secret Grants for Countering Violent Extremism Programs Split Communities." Sydney Morning Herald (2015).
House, White. Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts In The White House., 2015.
Lupu, Catalin, Valeriu Lupu, and Gîlc Gheorghe. Securing online banking services using iris recognition In Annals of the "Constantin Brancusi" University of Targu Jiu, Engineering Series., 2015.
Wrona, Konrad. Securing the Internet of Things a military perspective In IEEE 2nd World Forum on Internet of Things (WF-IoT). Milan, Italy, 2015.
Lu, Tianbo, Jiaxi Lin, Lingling Zhao, Yang Li, and Yong Peng. "A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields." International Journal of Security and Its Applications 9, no. 7 (2015): 1-16.
Rettman, Andrew. Security fears prompt fences on EU-Russia border. EUobserver, 2015.
Minchev, Zlatogor. Security Foundations in Cyber Space, Training Course Selected Materials., 2015.
Azim, Muzaffar, and Kazim S. Naqvi. "A Security Framework for Cloud Based Egovernance System." International Journal of Science, Technology & Management 4, no. 2 (2015).
Seismological Observatory of the Hungarian Academy of Sciences., 2015.
Ridland, Andrew. Seizing the Digital High Ground: Military Operations and Politics in the Social Media Era In Joint Forces Staff College, Joint Advanced Warfighting School. Vol. Master of Science in Joint Campaign Plannin. National Defense University, British Army, 2015.
Semtech: AN1200.22 - LoRa Modulation Basics ., 2015.
Semtech: ANNWS.01.2.1.W.SYS - LoRaWAN Network Server Demonstration: Gateway to Server Interface Definition In Revision 1.0., 2015.
Sendai Framework for Disaster Risk Reduction 2015-2030 In Third UN World Conference on Disaster Risk Reduction., 2015.
Rigante, Sara. "Sensing with Advanced Computing Technology: Fin Field-Effect Transistors with High-K Gate Stack on Bulk Silicon." ACS Nano 9, no. 15 (2015): 4872-4881.
Mandic, Danilo. Separatists, Gangsters and Other Statesmen: The State, Secession and Organized Crime in Serbia and Georgia, 1989-2012 In Graduate School of Arts & Sciences. Vol. Doctoral dissertation. Harvard University, 2015.
Nikolic, Nebojsa. "Serbian Security Perceptions: Motivations to Serve." Information & Security: An International Journal 33, no. 2 (2015): 122-137.
SHARE Foundation., 2015.
Vidino, Lorenzo. "Sharia4: From Confrontational Activism to Militancy." Perspectives on Terrorism 9, no. 2 (2015): 2-16.
Bloom, Mia. "She-hadis? Online Radicalization and the Recruitment of Women." In Violence and Gender in the Globalized World: The Intimate and the Extimate. Routledge, 2015.
Kinoshita, Tomofumi, and Tadano Masato. Shin Conmentaru Kenpo [Commentary of Japanese Constitution]. Japan Hyoron Sha via Kindle, 2015.
Lee, Rossey. "SimSpace Cyber Range." In Panel: Cyber Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research. Boston, United States, 2015.
Snarsky, Andrei, and Dmitry Lande. Simulation of complex networks: A manual. Kyiv: NTTU KPI, 2015.
Rassler, Don. "Situating the Emergence of the Islamic State of Khorasan." CTC Sentinel 8, no. 3 (2015): 7-11.

Pages