Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2015
Baker, Aryn
.
Nigeria Military Quails when faced with Boko Haram
. TIME, 2015.
Google Scholar
RTF
EndNote XML
Nine British Medics Feared to Have Crossed into Syria
. BBC News, 2015.
Google Scholar
RTF
EndNote XML
Perry, Bret
.
"
Non-Linear Warfare in the Ukraine: The Critical Role of Information Operations and Special Operations
."
Small Wars Journal
(2015).
Google Scholar
RTF
EndNote XML
Meulenbelt, Stephanie E.
, and
Maarten S. Nieuwenhuizen
.
"
Non-State actors’ pursuit of CBRN weapons: From motivation to potential humanitarian consequences
."
International Review of the Red Cross
97, no. 899 (2015): 831-858.
Google Scholar
RTF
EndNote XML
Jovanovic, Milos
.
Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross-country Comparison, in Exploring the Security Landscape – Non-traditional Security Challenges
In
forthcoming
. Dordrecht: Springer, 2015.
Google Scholar
RTF
EndNote XML
Dzebisashvili, Shalva
.
"
Norms versus Interests: The Ambiguous Nature of NATO’s Democratic Conditionality in Armenia
."
Connections: The Quarterly Journal
14, no. 2 (2015): 13-35.
DOI
Google Scholar
RTF
EndNote XML
O’Dwyer, Gerard
.
Norway Prioritizes High North Equipment
. Defense News, 2015.
Google Scholar
RTF
EndNote XML
Maigre, Merle
.
Nothing New in Hybrid Warfare: The Estonian Experience and Recommendations for NATO
In
Policy Brief
. German Marshall Fund of the United States, 2015.
Google Scholar
RTF
EndNote XML
Manjula, D.
, and
J. Thilagavathi
.
"
A Novel Approach for Behavior based Charge Card Fraud Detection using Support Vector Machines
."
IJSRD - International Journal for Scientific Research & Development|
3, no. 6 (2015).
Google Scholar
RTF
EndNote XML
Lee, Chae Chang
, and
Ji Won Yoon
.
"
A novel statistical approach to detect card frauds using transaction patterns
."
IEICE Transactions on Information and Systems
E98D, no. 3 (2015): 649-660.
Google Scholar
RTF
EndNote XML
NSA Serbia, Support to the National Security Council and the Coordination Bureau for Security Services
., 2015.
Google Scholar
RTF
EndNote XML
Nuclear Agency
., 2015.
Google Scholar
RTF
EndNote XML
Nuclear Force Reductions and Modernizations Continue; Peace Operations Increase
. Stockholm International Peace Research Institute, 2015.
Google Scholar
RTF
EndNote XML
The Nuclear Forum
., 2015.
Google Scholar
RTF
EndNote XML
Nuclear Regulatory Agency
., 2015.
Google Scholar
RTF
EndNote XML
Khatib, Lina
.
The Nusra Front’s Game Changing Rise in Syria
. Carnegie Middle East Center, 2015.
Google Scholar
RTF
EndNote XML
Domingos, Silvio Luiz
.
O uso de algoritmos não supervisionados na descoberta de padrões em transações de cartão de crédito: uma análise comparativa entre SOM, EM e K-means
., 2015.
Google Scholar
RTF
EndNote XML
Odjeljenje za informacionu bezbjednost
., 2015.
Google Scholar
RTF
EndNote XML
Office of Cyber Security and Information Assurance (OCSIA)
. SearchSecurity.co.UK, 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Agency for Forensics and Expert Examination
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Directorate for Coordination of Police Bodies
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Federal Police Administration
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Ministry of Interior of Republic of Srpska
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Ministry of Security of Bosnia and Herzegovina
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Personnel Education and Professional Development Agency
., 2015.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
214
215
216
217
218
219
220
221
222
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance