Biblio

Export 21404 results:
2017
Stolberg, Alan. Strategic Plan for DEEP Ukraine (as of December 2016). EDWG, 2017.
Allen, Robert A., and Gareth R. T. White. "A Study of Attitudes Towards Threat in the United Kingdom Ministry of Defence Commercial Function." In British Academy of Management Conference. University of Warwick , 2017.
Zarembo, Kateryna. "Substituting for the State: The Role of Volunteers in Defense Reform in Post-Euromaidan Ukraine." Kyiv-Mohyla Law and Politics Journal 3 (2017): 47-70.
Lehto, Martti, and Jarno Limnéll. Suomen kyberturvallisuuden nykytila, tavoitetila ja tarvittavat toimenpiteet tavoitetilan saavuttamiseksi (Finland’s Cyber Security: The Present State, Vision and the Actions Needed to Achieve the Vision). Helsinki: Prime Min¬ister's Office, 2017.
Suomen kyberturvallisuusstrategian toimeenpano-ohjelma 2017-2020 (Implementation Programme for Finland’s Cyber Security Strategy for 2017-2020). Helsinki: The Security Committee, 2017.
Morsey, Christopher. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure. Robert Morris University, 2017.
Khoufi, Ines, Pascale Minet, Anis Laouiti, and Saoucene Mahfoudh. "Survey of Deployment Algorithms in Wireless Sensor Networks: Coverage and Connectivity Issues and Challenges." International journal of autonomous and adaptive communications systems 10, no. 4 (2017): 341-390.
Kemp, Harry. The Survival of Small Businesses in Northeastern Florida After a Natural Disaster In Management. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2017.
Nyberg, Per, and James Masters. Sweden Terror Suspect ‘Confesses’ to Stockholm Attack. CNN, 2017.
Gustafsson, Linus, and Magnus Ranstorp. Swedish Foreign Fighters in Syria and Iraq: An analysis of open-source intelligence and statistical data. Swedish Defence University: Center for Asymmetric Threat Studies (CATS), 2017.
Eakin, Hugh. "The Swedish Kings of Cyberwar." New York Review of Books 64, no. 1 (2017): 57.
Hryshchuk, Ruslan, and Kateryna Molodetska. "Synergetic Control of Social Networking Services Actors’ Interactions." In Recent Advances in Systems, Control and Information Technology. SCIT 2016. Advances in Intelligent Systems and Computing. Vol. 543. Cham: Springer, 2017.
Amideo, Annunziata Esposito, and Maria Paola Scaparra. A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability In Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science. Vol. 10242. Paris, France , 2017.
"Syria: ISIS to be driven out of Raqqa within two months, claims top commander." Independent (2017): August 28, 2017.
Sklyar, Vladimir, Vyacheslav Kharchenko, and Eugene Babeshko. "System of Systems as an Object of Security Analysis." In Secure and Resilient Computing for Industry and Human Domains: Secure and Resilient Systems, Networks and Infrastructures. Kharkiv: National Aerospace University “N. E. Zhukovsky”, 2017.
Zaslavsky, Vladimir. System principles, mathematical models and methods to ensure high reliability of safety systems In Proc. SPIE 10418, XI Conference on Reconnaissance and Electronic Warfare Systems., 2017.
Tsakalidis, George, and Kostas Vergidis. "A Systematic Approach Toward Description and Classification of Cybercrime Incidents." IEEE Transactions on Systems, Man, and Cybernetics: Systems (2017): 1-20.
Zandian, Zahra Karimi, and Mohammadreza Keyvanpour. "Systematic identification and analysis of different fraud detection approaches based on the strategy ahead ." International Journal of Knowledge-based and Intelligent Engineering Systems 21, no. 2 (2017): 123-134.
Sharkov, George. "A System-of-Systems Approach to Cyber Security and Resilience." Information & Security: An International Journal 37 (2017): 69-94.
Tahrir al-Sham: Al-Qaeda’s Latest Incarnation in Syria In BBC Monitoring. BBC News, 2017.
Pion-Berlin, D.. "A Tale of Two Missions: Mexican Military Police Patrols Versus High-Value Targeted Operations." Armed Forces & Society 43, no. 1 (2017).
Schmitt, Michael N.. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Second edition. Cambridge, UK: Cambridge University Press, 2017.
Ishiwatari, Mikio, and Kenichi Tsukahara. Technical Note on the Estimation of Infrastructure Demand for Flood Control In Bridging the Infrastructure Gap in Asia, ADB-JICA Joint Side Event at the 50th Annual Meeting of the ADB Board of Governors. Yokohama, 2017.
Bogdanova, Ana, Jugoslav Achkoski, and Jurij Tasic. "Telemedicine in Macedonia–Smart I (Eye) Advisory Rescue System." In Benchmarking Telemedicine: Improving Health Security in the Balkans. IOS Press, 2017.
Karnitschnig, Matthew. Terror sparks call to centralize German police powers. Politico, 2017.

Pages