Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2014
Ferraro, M. F.
.
"
"Groundbreaking" or Broken? An Analysis of SEC Cybersecurity Disclosure Guidance, Its Effectiveness, and Implications
."
Albany Law Review
77, no. 2 (2014).
Google Scholar
RTF
EndNote XML
al-‘Ubaydi, Muhammed
,
Nelly Lahoud
,
Daniel Milton
, and
Bryan Price
.
The Group That’s Calls Itself a State: Understanding the Evolution and Challenges of the Islamic State
. Vol. 31. The Combating Terrorism Center at West Point, 2014.
Google Scholar
RTF
EndNote XML
Tsintsadze-Maass, Eteri
, and
Richard W. Maass
.
"
Groupthink and Terrorist Radicalization
."
Terrorism and Political Violence
26, no. 5 (2014): 735-58.
Google Scholar
RTF
EndNote XML
Guidelines for Resilience Systems Analysis: How to Analyse Risk and Build a Roadmap to Resilience
. OECD Publishing, 2014.
Google Scholar
RTF
EndNote XML
Guidelines for Smart Grid Cybersecurity: Privacy and the Smart Grid
. Vol. 2. National Institute of Standards and Technology, 2014.
DOI
Google Scholar
RTF
EndNote XML
Guidelines of the Minister of National Defence for 2014–2019
., 2014.
Google Scholar
RTF
EndNote XML
Dolan, Chris
.
"
Has Patriarchy Been Stealing the Feminists’ Clothes? Conflict-Related Sexual Violence and UN Security Council Resolutions
."
IDS Bulletin
45 , no. 1 (2014).
DOI
Google Scholar
RTF
EndNote XML
Fjäder, Christian
.
"
he Nation-State, National Security and Resilience in the Age of Globalisation
."
Resilience
2, no. 2 (2014): 114-129.
DOI
Google Scholar
RTF
EndNote XML
Ravish, Deepika
,
Nayana R. Shenoy
,
K. Shanthi
, and
S. Nisargh
.
Heart function monitoring, prediction and prevention of heart attacks: Using artificial neural networks
In
2014 International Conference on Contemporary Computing and Informatics (IC3I)
., 2014.
Google Scholar
RTF
EndNote XML
Heavy metals in the components of the environment Mariupol City: Ecological and geochemical aspects (in Ukrainian)
. Kiev: Interservis, 2014.
Google Scholar
RTF
EndNote XML
Jamah, Ally
.
Heavy-handed Counter-Terrorism Tactics Added Pepper to Injury This Year
. Standard Digital News, 2014.
Google Scholar
RTF
EndNote XML
Masi, Alessandria
.
"
Here’s How ISIS Recruits Westerners
."
Business Insider
(2014).
Google Scholar
RTF
EndNote XML
Bienaimé, Pierre
.
"
Here’s Why So Many of Tunisia’s Youth Are Drawn to ISIS
."
Business Insider, last modified
(2014).
Google Scholar
RTF
EndNote XML
Mantoux, Stéphane
.
Hide These Jihadists That I Can’t See: The French Volunteers In Syria
. Jihadology, 2014.
Google Scholar
RTF
EndNote XML
High Representative of the Union for Foreign Affairs and Security Policy
., 2014.
Google Scholar
RTF
EndNote XML
Barlow, Caleb
.
"
Highlights and Insights
." In
RSA 2014 Conference
., 2014.
Google Scholar
RTF
EndNote XML
How a Georgian sergeant became a Jihad leader in Iraq
. Vol. 8 July 2014. BBC (Russian Service), 2014.
Google Scholar
RTF
EndNote XML
Karadsheh, Jomana
,
Jim Sciutto
, and
Laura Smith-Spark
.
How Foreign Fighters Are Swelling ISIS Ranks in Startling Numbers
. CNN, 2014.
Google Scholar
RTF
EndNote XML
Ajbaili, Mustapha
.
How ISIS Conquered Social Media
. Al Arabiya News, 2014.
Google Scholar
RTF
EndNote XML
J.M., Berger
.
How ISIS Games Twitter
., 2014.
Google Scholar
RTF
EndNote XML
Pomerantsev, Peter
.
"
How Russia Is Revolutionizing Information Warfare
."
Defense One
(2014).
Google Scholar
RTF
EndNote XML
Read, Oliver
.
"
How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage
." In
Cyberspace and International Relations
, 203-230 . Berlin, Heidelberg : Springer, 2014.
Google Scholar
RTF
EndNote XML
Dokos, Thanos
.
"
How the EU got it so Wrong in Ukraine
."
Europe’s World
(2014).
Google Scholar
RTF
EndNote XML
Galeotti, Mark
.
"
How the Invasion of Ukraine Is Shaking Up the Global Crime Scene
."
Vice News
(2014).
Google Scholar
RTF
EndNote XML
Nuriyev, Elkhan
.
"
How the West Helps Putin Fulfill His CIS Strategy
."
The Moscow Times
(2014).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
248
249
250
251
252
253
254
255
256
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance