Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21406 results:
RTF
EndNote XML
2017
Dhunjishah, Michael G.
.
Active Measures Working Group: What’s Past is Prologue
. Carlisle, PA: United States Army War College, 2017.
Google Scholar
RTF
EndNote XML
Urciuoli, Luca
, and
Juha Hintsa
.
"
Adapting supply chain management strategies to security–an analysis of existing gaps and recommendations for improvement
."
International Journal of Logistics Research and Applications
20, no. 3 (2017): 276-295.
Google Scholar
RTF
EndNote XML
Schauer, Stefan
,
Martin Stamer
,
Claudia Bosse
,
Michalis Pavlidis
,
Haralambos Mouratidis
,
Sandra König
, and
Spyros Papastergiou
.
An Adaptive Supply Chain Cyber Risk Management Methodology
In
Hamburg International Conference on Logistics, Project: MITIGATE
., 2017.
DOI
Google Scholar
RTF
EndNote XML
Kurfalı, Murathan
,
Ali Arifoğlu
,
Gül Tokdemir
, and
Yudum Paçin
.
"
Adoption of e-government services in Turkey
."
Computers in Human Behavior
66 (2017): 168-178.
Google Scholar
RTF
EndNote XML
Smith, Bryant
.
Advanced Malware Detection with Suricata Lua Scripting
. Trustwave, 2017.
Google Scholar
RTF
EndNote XML
Ahrar al-Sham
In
Mapping Militant Organizations
., 2017.
Google Scholar
RTF
EndNote XML
Owens, Katherine
.
AI will now have input in Air Force decision-making
. Defense Systems, 2017.
Google Scholar
RTF
EndNote XML
Eliseev, Alexandr
, and
Alexandr Prygunov
.
"
Algorithm for Controlling Parameters of Linear Filter Based on Fuzzy Expert System
." In
XIII International Scientific-Technical Conference “Dynamic of Technical Systems” (DTS-2017)
., 2017.
Google Scholar
RTF
EndNote XML
Schueffel, Patrick
.
Alternative distributed ledger technologies Blockchain vs. Tangle vs. Hashgraph-A high-level overview and comparison
In
Tangle vs. Hashgraph-A High-Level Overview and Comparison
., 2017.
Google Scholar
RTF
EndNote XML
"
Ambitious Framwork Nation: Germany in NATO. Bundeswehr Capability Planning and the 'Framework Nations Concept'
."
SWP Comments (German Institute for International and Security Affairs)
35 (2017).
Google Scholar
RTF
EndNote XML
Amri-Sonderermittler klagt über Probleme bei der Akteneinsicht
. Der Tagesspiegel online, 2017.
Google Scholar
RTF
EndNote XML
Izzati, Berlian Maulidya
.
Analisis Pengaruh Kualitas Layanan Publik E-Government (Government to Citizen) Terhadap Penciptaan Public Value (Studi Kasus: Kota Surabaya)
In
Institut Teknologi Sepuluh Nopember
. Vol. Masters thesis., 2017.
Google Scholar
RTF
EndNote XML
Prakash, A.
.
"
Analysis of the Modern Techniques and Methods on Credit Card Fraud Detection
."
International Journal for Research in Science Engineering and Technology
4, no. 6 (2017).
Google Scholar
RTF
EndNote XML
Ukraine, The State Emer
.
Analytical review of the state of technogenic and natural safety in Ukraine for 2016
., 2017.
Google Scholar
RTF
EndNote XML
Young, Thomas-Durell
.
Anatomy of Post-Communist European Defense Institutions: The Mirage of Military Modernity
. Bloomsbury Academic, 2017.
Google Scholar
RTF
EndNote XML
Lutz, Martin
, and
Constanze Reuscher
.
Anis Amri soll regelmäßig Drogen genommen haben
. Welt online, 2017.
Google Scholar
RTF
EndNote XML
Zhao, Hao
,
Yaokai Feng
,
Hiroshi Koide
, and
Kouichi Sakurai
.
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS
In
Seventh International Symposium on Computing and Networking (CANDAR)
. Nagasaki, Japan, 2017.
DOI
Google Scholar
RTF
EndNote XML
Bertolino, Antonia
, and
Lata Nautiyal
.
"
Annotated buzzwords and key references for software testing in the cloud
." In
International Conference on Computing, Communication and Automation (ICCCA)
. Greater Noida, India, 2017.
Google Scholar
RTF
EndNote XML
Annual Report on the Status of Defense and the Armed Forces
. Sofia: Council of Ministers, 2017.
Google Scholar
RTF
EndNote XML
Triepels, Ron
,
Hennie Daniels
, and
Ronald Heijmans
.
Anomaly Detection in Real-Time Gross Settlement Systems
In
Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017)
. Vol. 1., 2017.
Google Scholar
RTF
EndNote XML
Anschlag in Berlin – weitere Manipulationen an Akte Amri
. Zeit online, 2017.
Google Scholar
RTF
EndNote XML
Bunina, Anastasiia
,
Oleksandr T. Azimov
, and
Yelyzaveta M. Dorofey
.
"
Application of geoinformation approach to the study of secondary migration of the pollutants from the industrial pollution sources
." In
16th EAGE Int. Conf. on Geoinformatics – Theoretical and Applied Aspects
., 2017.
DOI
Google Scholar
RTF
EndNote XML
Zaslavskyi, Volodymyr
,
Kateryna Krasovska
, and
Maya Pasichna
.
"
Application of the Method of Analysis of Hierarchies in Solving the Problem of Diversification of the Composition of the Portfolio of Electricity Generation
."
Visnyk Kyivskoho universytetu, Seriia: Fizyko-matematychni nauky
2 (2017): 123-131.
Google Scholar
RTF
EndNote XML
Senthilnath, J.
,
Manasa Kandukuri
,
Akanksha Dokania
, and
Ramesh Kestur
.
"
Application of UAV Imaging Platform for Vegetation Analysis Based on Spectral-Spatial Methods
."
Computers and Electronics in Agriculture
140 (2017): 8-24.
Google Scholar
RTF
EndNote XML
Korchenko, Oleksandr
,
Svitlana Kazmirchuk
, and
Berik Akhmetov
.
Applied Information Security Assessment Systems
. TsP Komprynt, 2017.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
114
115
116
117
118
119
120
121
122
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance