Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2017
Security, IBM
.
QRadar Version 7.3.1 User guide
., 2017.
Google Scholar
RTF
EndNote XML
Poryazov, Stoyan
,
Dmytro Progonov
, and
Emiliya Saranova
.
"
Quality of Telecommunications as a Composition of Qualities of Subservices, Including Security and Trusted Third Parties
." In
2017 25th Telecommunication Forum (TELFOR)
. Belgrade, Serbia, 2017.
Google Scholar
RTF
EndNote XML
Hemmings, John
.
Quasi-alliances, managing the rise of China, and domestic politics: the US-Japan-Australia trilateral 1991-2015
. Vol. PhD thesis. The London School of Economics and Political Science (LSE), 2017.
Google Scholar
RTF
EndNote XML
Castro-Arvizu, Juan Manuel
,
Jordi Vila`-Valls
,
Ana Moragrega
,
Pau Closas
, and
Juan A. Fernandez-Rubio
.
"
Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm
."
International Journal of Distributed Sensor Networks
13, no. 8 (2017).
Google Scholar
RTF
EndNote XML
Castro-Arvizu, Juan Manuel
,
Jordi Vilà-Valls
,
Ana Moragrega
,
Pau Closas
, and
Juan A. Fernandez-Rubio
.
"
Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm
."
International Journal of Distributed Sensor Networks
13, no. 8 (2017).
Google Scholar
RTF
EndNote XML
Hidayah, Maulidia Rahmah
,
Isa Akhlis
, and
Endang Sugiharti
.
"
Recognition Number of The Vehicle Plate Using Otsu Method and K-Nearest Neighbour Classification
."
Scientific Journal of Informatics
4, no. 1 (2017).
Google Scholar
RTF
EndNote XML
Couture, Jean-René
.
"
Reconciling Operational and Financial Planning Views in a Customer-Funded Organization: Making Customer-Funding Work for NC3A
."
Information & Security: An International Journal
38 (2017): 63-69.
DOI
Google Scholar
RTF
EndNote XML
Kaplan, Jeffrey
.
"
Red Dawn is Now: Race vs. Nation and the American Election
."
Terrorism and Political Violence
29, no. 3 (2017).
Google Scholar
RTF
EndNote XML
Siudak, Piotr
.
"
Redefining cybersecurity through processual ontology of the cyberspace
."
Politeja
50, no. 14 (2017): 194-211.
Google Scholar
RTF
EndNote XML
Reform der Sicherheitsbehörden – Wie wär’s mit einem deutschen FBI?
. Spiegel online, 2017.
Google Scholar
RTF
EndNote XML
Croissant, Aurel
, and
David Kuehn
.
Reforming Civil-Military Relations in New Democracies: Democratic Control and Military Effectiveness in Comparative Perspectives
. Springer International Publishing AG , 2017.
DOI
Google Scholar
RTF
EndNote XML
Kocharyan, Hayk
.
Regional Security Dynamics: Azerbaijan
In
Analytical Bulletin: Center for Civilization and Cultural Studies
., 2017.
Google Scholar
RTF
EndNote XML
On regulation of urban development activities
In
Law of Ukraine
., 2017.
Google Scholar
RTF
EndNote XML
Mayer, Peter
,
Alexandra Kun
, and
Melanie Volkamer
.
Reliable Behavioural Factors in the Information Security Context
In
ACM International Conference Proceeding Series
. Vol. Part F1305., 2017.
DOI
Google Scholar
RTF
EndNote XML
Oyekan, John
,
Vinayak Prabhu
,
Ashutosh Tiwari
,
Vinubha Baskaran
,
Mark Burgess
, and
Rob Mcnally
.
"
Remote real-time collaboration through synchronous exchange of digitised human-workpiece interactions
."
Future Generation Computer Systems
67 (2017): 83-93.
Google Scholar
RTF
EndNote XML
Enev, E.
,
Grigor Velev
,
Nikolai Stoianov
, and
Maya Bozhilova
.
Requirements for the Sensor Platform and Network for Indoor Deployment and Exterior Based Radiofrequency Awareness
In
,” International Research Conference 105 Years Security and Defense Research
. Sofia: Bulgarian Military Academy “G. S. Rakovski ”, 2017.
Google Scholar
RTF
EndNote XML
Edgar, Thomas W.
, and
David O. Manz
.
Research Methods for Cyber Security
. Cambridge: Elsevier, 2017.
Google Scholar
RTF
EndNote XML
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU
. Brussels: European Commission, 2017.
Google Scholar
RTF
EndNote XML
Herrera, Hugo
.
"
Resilience for Whom? The Problem Structuring Process of the Resilience Analysis
."
Sustainability
9, no. 7 (2017): 1196.
DOI
Google Scholar
RTF
EndNote XML
Sampaio, Antônio
.
"
Resilience Gains Ground in Counter-Terrorism Strategies
."
Jane’s Intelligence Review
29, no. 12 (2017): 18-21.
Google Scholar
RTF
EndNote XML
Raicu, Irina
.
Rethinking Ethics Training in Silicon Valley
. The Atlantic, 2017.
Google Scholar
RTF
EndNote XML
Albert, Isaac Olawale
.
"
Rethinking the Functionality of the Multinational Joint Task Force in Managing the Boko Haram Crisis in the Lake Chad Basin
."
Africa Develop¬ment
42, no. 3 (2017): 119-135.
Google Scholar
RTF
EndNote XML
Khattak, Muhammad Adil
,
Muhammad Khairy Har Shaharuddin
,
Muhammad Saiful Isl Haris
,
Muhammad Zuhaili Mo Aminuddin
,
Nik Mohamad Am Azhar
, and
Nik Muhammad H. Ahmadin
.
"
Review of cyber security applications in nuclear power plants
."
Journal of Advanced Research in Applied Sciences and Engineering Technology
7, no. 1 (2017): 43-54.
Google Scholar
RTF
EndNote XML
Reytyng Presydenta katastrofichno padaye
. Esspresso TV, 2017.
Google Scholar
RTF
EndNote XML
Abreu, A.
, and
J.M.F. Calado
.
"
Risk Model to Support the Governance of Collaborative Ecosystems
."
IFAC-PapersOnLine
50, no. 1 (2017): 10544-10549.
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
137
138
139
140
141
142
143
144
145
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance