Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2014
Mendelsohn, Barak
.
After Disowning ISIS, al Qaeda is Back on Top
. Foreign Affairs, 2014.
Google Scholar
RTF
EndNote XML
Kucera, Joshua
.
"
After Summit, Caspian Sea Questions Linger
."
The Diplomat
(2014).
Google Scholar
RTF
EndNote XML
Alimov, Timur
.
"
’Alabuga’ will make useless enemy equipment (in Russian)
."
Russian weapons
(2014).
Google Scholar
RTF
EndNote XML
Begaj, Eranda
.
Albania’s Vision towards Cyber Security
In
Paper from DCAF Young Faces 2014 - Cybersecurity Winter School for the Western Balkans
. Geneva: DCAF, 2014.
Google Scholar
RTF
EndNote XML
Al-Da’ma, Muhammad
.
"
al-da’iyya al-urduniyya al-mutashaddad Abu Qatada yantaqad I’lan al-khilafa al-islamiyya
."
Al-Sharq al-Awsat
16, no. 7 (2014).
Google Scholar
RTF
EndNote XML
DeFillippi, Robert
, and
Thorsten Rose
.
"
Aligning the co-creation project portfolio with company strategy
."
Strategy & Leadership
42, no. 1 (2014): 30-36.
Google Scholar
RTF
EndNote XML
Lakoff, George
.
The ALL NEW Don't Think of an Elephant! Know Your Values and Frame the Debate
. White River Junction, VT: Chelsea Green Publishing, 2014.
Google Scholar
RTF
EndNote XML
Schmid, Alex P.
.
Al-Qaeda’s “Single Narrative” and Attempts to Develop Counter-Narratives: The State of Knowledge
In
ICCT Research Paper
. The Hague: The International Centre for Counter-Terrorism (ICCT), 2014.
Google Scholar
RTF
EndNote XML
Riechmann, Deb
.
"
Al-Qaida decentralized, but not necessarily weaker
."
Associated Press
(2014).
Google Scholar
RTF
EndNote XML
Althea/BiH
. European Union External Action, 2014.
Google Scholar
RTF
EndNote XML
Apps, Peter
.
Ambiguous Warfare’ Providing NATO with New Challenges, Reuters
., 2014.
Google Scholar
RTF
EndNote XML
Kovačević, Božo
.
"
Američko javno-privatno partnerstvo i cyber sigurnost
."
Politička misao
51, no. 3 (2014): 76-100.
Google Scholar
RTF
EndNote XML
Amfilohije osudio politiku Crne Gore prema Rusiji [Amfilohije Condemned Montenegro’s Policy Towards Russia]
. Blic, 2014.
Google Scholar
RTF
EndNote XML
Loretoni, Anna
.
Ampliare lo sguardo. Genere e teoria politica
. Roma: Donzelli, 2014.
Google Scholar
RTF
EndNote XML
Ripley, Tim
, and
Bruce Jones
.
"
Analysis: How Russia Annexed Crimea
."
IHS Jane’s Defense Weekly
51, no. 14 (2014): 5.
Google Scholar
RTF
EndNote XML
Gospodinova, Elitsa
,
Mario Angelov
, and
Taschko Nikolov
.
Analysis of a Security System for Distributed Data Transmission of Voice
In
MT&S-2013 Conference
. Sofia: Defence Institute, 2014.
Google Scholar
RTF
EndNote XML
Calzarossa, M.C.
, and
L. Massari
.
Analysis of header usage patterns of HTTP request messages
In
16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems
., 2014.
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
, and
Yuriy P. Kondratenko
.
"
Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S
."
Technical News − in Ukrainian
39-40 (2014): 15-19.
Google Scholar
RTF
EndNote XML
Siddiqui, Abdul Hameed
,
Mansoor Ahsan
,
Shair Afgan Rind
, and
Attaullah Memon
.
"
Analysis of varying control inputs for a fixed wing unmanned aerial vehicle
." In
17th IEEE International Multi Topic Conference 2014
. Karachi, Pakistan, 2014.
DOI
Google Scholar
RTF
EndNote XML
Turgut, Erhan
,
Salih Ergün
, and
Abdülkadir Öz
.
"
Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups
."
International Journal of Electronics and Communication Engineering
8, no. 3 (2014).
Google Scholar
RTF
EndNote XML
Darczewska, Jolanta
.
The Anatomy of Russian Information Warfare. The Crimean Operation, a Case Study
In
OSW Point of View series, Warsaw: Center for Eastern Studies
. Vol. 42., 2014.
Google Scholar
RTF
EndNote XML
Angry Birds Web Page
., 2014.
Google Scholar
RTF
EndNote XML
Annual National Plan 2014 for implementation of the National Programme for Disaster Protection 2014-2018
., 2014.
Google Scholar
RTF
EndNote XML
Annual Report on the Implementation of the Swiss–Latvian Cooperation Programme in Latvia April 2013 – March 2014
., 2014.
Google Scholar
RTF
EndNote XML
Ansar Beit al-Maqdis Pledges Allegiance to the Islamic State
. SITE Intelligence, 2014.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
234
235
236
237
238
239
240
241
242
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance