Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2016
Mukhopadhay, Kishalaya
.
"
Queering the Narrative: Can the Subaltern Sex Speak?
"
Economic & Political Weekly
51, no. 2 (2016): 20-23.
Google Scholar
RTF
EndNote XML
Carati, Andrea
.
"
R2P, NATO and the Problem of Who Should Intervene?
" In
TSA 15th Annual Conference 2016 – University of Plymouth
., 2016.
Google Scholar
RTF
EndNote XML
Meserole, Chris
.
"
Radicalization, Laïcité, and the Islamic Veil
."
Regional
(2016).
Google Scholar
RTF
EndNote XML
Choudhary, Pankaj
, and
Upasna Singh
.
"
Ranking Terrorist Nodes of 26/11 Mumbai Attack using Analytical Hierarchy Process with Social Network Analysis
." In
11th Annual Simposium on Information Assurance (Asia’16)
. Albany, NY, 2016.
Google Scholar
RTF
EndNote XML
Assaker, Rana
.
The Rapid Rise of the Islamic State in Syria: When State Weakness, Identity Politics and Regional Vacuum of Power Collide
In
International Affairs
. Vol. Master of Arts . Lebanese American University, 2016.
Google Scholar
RTF
EndNote XML
Benoudnine, Hadjira
,
Abdelkrim Meche
,
Mokhtar Keche
,
Abdelaziz Ouamri
, and
Malcolm S. Woolfson
.
"
Real time Hough transform based track initiators in clutter
."
Information Sciences
337–338 (2016): 82-92.
DOI
Google Scholar
RTF
EndNote XML
Omotosho, Adebayo
,
Omotanwa Adegbola
, and
Michael Edobor
.
"
Reanalyzing Li and Tao. (2014): Investigating Algorithm Recognition on Dark Irises
."
International Journal of Computer Applications (0975 – 8887)
155, no. 10 (2016).
Google Scholar
RTF
EndNote XML
Barker, Elaine
.
Recommendation for Key Management
In
NIST Special Publication
., 2016.
DOI
Google Scholar
RTF
EndNote XML
Lange-Ionatamišvili, Elīna
.
Redefining Euro-Atlantic Values: Russia’s Manipulative Techniques
. Riga: NATO Strategic Communications Centre of Excellence, 2016.
Google Scholar
RTF
EndNote XML
Kayaalp, Ebru
, and
Jack Jurich
.
"
Redefining Propaganda in the Internet Age: Social Media Wars between ISIS and the US
." In
2016 International Conference on Social Media & Society
., 2016.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
"
Reflecting Developments in Hybrid Warfare into Defence Policy
." In
Countering Hybrid Threats: Lessons Learned from Ukraine
, 27-33. Amsterdam: IOS Press, 2016.
DOI
Google Scholar
RTF
EndNote XML
Värnqvist, P
.
Reflexiv kontroll: evig metod som systematiserats?
In
Självständigt arbete krigsvetenskap
., 2016.
Google Scholar
RTF
EndNote XML
Värnqvist, Peter
.
Reflexiv kontroll: evig metod som systematiserats?
. Stockholm: Swedish National Defence College, 2016.
Google Scholar
RTF
EndNote XML
Regulation (EU) 2016/679 of the European Parliament and of the Council
., 2016.
Google Scholar
RTF
EndNote XML
Shlapak, David A.
, and
Michael V. Johnson
.
Reinforcing Deterrence on Nato’s Eastern Flank
. RAND Corporation, 2016.
Google Scholar
RTF
EndNote XML
Čajić, Jasmin
.
"
The Relevance of Clausewitz’s Theory of War to Contemporary Conflict Resolution
."
Connections: The Quarterly Journal
15, no. 1 (2016): 72-78.
DOI
Google Scholar
RTF
EndNote XML
Rodrigues, Luis
,
Joel Guerreiro
, and
Noélia Correia
.
"
RELOAD/CoAP Architecture with Resource Aggregation/Disaggregation Servic
." In
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
. Valencia, 2016.
DOI
Google Scholar
RTF
EndNote XML
"
Remaining and expanding
."
Dabiq
5 (2016): 20-33.
Google Scholar
RTF
EndNote XML
Pyatt, Geoffrey
.
Remarks by Ambassador Pyatt at the “Countering Information War in Ukraine”
In
Speeches and Interviews by Ambassador Geoffrey R. Pyatt – Embassy of the USA in Ukraine, Conference, January 29, 2016
., 2016.
Google Scholar
RTF
EndNote XML
Remarks of Secretary Lew on the Evolution of Sanctions & Lessons for the Future at the Carnegie Endowment for International Peace
. United States Mission to the European Union, 2016.
Google Scholar
RTF
EndNote XML
MacDonald, Sarah
,
Matthew Staid
,
Melissa Staid
, and
Monica Cooper
.
"
Remote Hyperspectral Imaging of Grapevine Leafroll-associated Virus 3 in Cabernet Sauvignon Vineyards
."
Computers and Electronics in Agriculture
130 (2016): 109-117.
Google Scholar
RTF
EndNote XML
Kroenig, Matthew
.
The Renewed Russian Nuclear Threat and NATO Nuclear Deterrence Posture
. Washington, DC: Atlantic Council, 2016.
Google Scholar
RTF
EndNote XML
Report of the Select Committee on Intelligence
In
United States Senate on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election
., 2016.
Google Scholar
RTF
EndNote XML
Body of European Regulators for Electronic Communications(BEREC)
.
Report on OTT Services
., 2016.
Google Scholar
RTF
EndNote XML
Vandiver, John
.
Report: Russia Defeats NATO in Baltic War Game
. Stars and Stripes, 2016.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
170
171
172
173
174
175
176
177
178
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance