Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2015
Official Website of the Police of Brčko District
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Police Support Agency
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the Service for Foreigners’ Affairs
., 2015.
Google Scholar
RTF
EndNote XML
Official Website of the State Investigation and Protection Agency
., 2015.
Google Scholar
RTF
EndNote XML
Online news portal announcement
., 2015.
Google Scholar
RTF
EndNote XML
Cesare, Chris
.
"
Online Security Braces for Quantum Revolution
."
Nature
525 (2015): 167-168.
Google Scholar
RTF
EndNote XML
Open Cyber Challenge Platform
., 2015.
Google Scholar
RTF
EndNote XML
Operation Atlantic Resolve Fact Sheet
. US European Command Communication and Engagement Directorate, 2015.
Google Scholar
RTF
EndNote XML
Zsifkovits, Martin
,
Silja Meyer-Nieberg
, and
Stefan Pickl
.
"
Operations Research for Risk Management in Strategic Foresight
."
Planet@Risk
3, no. 2 (2015).
Google Scholar
RTF
EndNote XML
Prakash, A.
, and
C. Chandrasekar
.
"
An Optimized Multiple Semi-Hidden Markov Model for Credit Card Fraud Detection
."
Indian Journal of Science and Technology
8, no. 2 (2015): 165-171.
Google Scholar
RTF
EndNote XML
Backman, Sarah
.
"
Organising National Cybersecurity Centres
."
Information & Security: An International Journal
32, no. 1 (2015): 9-26.
DOI
Google Scholar
RTF
EndNote XML
Stojarová, Vera
.
"
Organized Crime in the Western Balkans
."
HUMSEC Journal
, no. 1 (2015).
Google Scholar
RTF
EndNote XML
Kumkova, Katya
.
"
Orthodox Church Leader Reflects on the Religious Dimension of the Ukrainian Crisis
."
Eurasianet
(2015).
Google Scholar
RTF
EndNote XML
Cherenkov, Mykhailo
.
"
Orthodox Terrorism
."
First Things
(2015).
Google Scholar
RTF
EndNote XML
OSCE Chairmanship Event on Effective Strategies to Cyber/ICT Security Threats
. Belgrade, Serbia, 2015.
Google Scholar
RTF
EndNote XML
OSCE Guide on Non-military confidence-building Measures (CBMs)
., 2015.
Google Scholar
RTF
EndNote XML
OSCE Mission to Serbia
., 2015.
Google Scholar
RTF
EndNote XML
Itakura, Yoichiro
.
Oshu Iinkai Dokkinho Ikigai Tekiyou [The European Commission Implements the Extraterritorial Application in Competition Law]
. FACTA Online, 2015.
Google Scholar
RTF
EndNote XML
Rahim, Tariq
.
An overview of helix antenna and its design
., 2015.
Google Scholar
RTF
EndNote XML
OWASP Security Shepherd
., 2015.
Google Scholar
RTF
EndNote XML
Rothkopf, David
.
"
The Paradox of Power in the Network Age
."
Foreign Policy
(2015): 98-100.
Google Scholar
RTF
EndNote XML
Souleimanov, Emil
, and
Megan Ouellette
.
The Participation of North Caucasian Jihadists in the Syrian Civil War and its Security Implications
. Rubin Center, 2015.
Google Scholar
RTF
EndNote XML
Starr, Barbara
, and
Jamie Crawford
.
Pentagon Hunts for ISIS on the Secret Internet
. CNN Politics, 2015.
Google Scholar
RTF
EndNote XML
Mak, Tim
, and
Nancy A. Youssef
.
"
The Pentagon is Keeping Half of Gitmo Locked Up Against the White House’s Wishes
."
The Daily Beast
(2015).
Google Scholar
RTF
EndNote XML
Wahid, AH
.
"
Perbudakan dalam Pandangan Islam: Hadith and Sirah Nabawiyyah Textual and Contextual Studies
."
Nuansa
VIII, no. 2 (2015): 141-154.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
215
216
217
218
219
220
221
222
223
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance