Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2014
Mantoux, Stéphane
.
Hide These Jihadists That I Can’t See: The French Volunteers In Syria
. Jihadology, 2014.
Google Scholar
RTF
EndNote XML
High Representative of the Union for Foreign Affairs and Security Policy
., 2014.
Google Scholar
RTF
EndNote XML
Barlow, Caleb
.
"
Highlights and Insights
." In
RSA 2014 Conference
., 2014.
Google Scholar
RTF
EndNote XML
How a Georgian sergeant became a Jihad leader in Iraq
. Vol. 8 July 2014. BBC (Russian Service), 2014.
Google Scholar
RTF
EndNote XML
Karadsheh, Jomana
,
Jim Sciutto
, and
Laura Smith-Spark
.
How Foreign Fighters Are Swelling ISIS Ranks in Startling Numbers
. CNN, 2014.
Google Scholar
RTF
EndNote XML
Ajbaili, Mustapha
.
How ISIS Conquered Social Media
. Al Arabiya News, 2014.
Google Scholar
RTF
EndNote XML
J.M., Berger
.
How ISIS Games Twitter
., 2014.
Google Scholar
RTF
EndNote XML
Pomerantsev, Peter
.
"
How Russia Is Revolutionizing Information Warfare
."
Defense One
(2014).
Google Scholar
RTF
EndNote XML
Read, Oliver
.
"
How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage
." In
Cyberspace and International Relations
, 203-230 . Berlin, Heidelberg : Springer, 2014.
Google Scholar
RTF
EndNote XML
Dokos, Thanos
.
"
How the EU got it so Wrong in Ukraine
."
Europe’s World
(2014).
Google Scholar
RTF
EndNote XML
Galeotti, Mark
.
"
How the Invasion of Ukraine Is Shaking Up the Global Crime Scene
."
Vice News
(2014).
Google Scholar
RTF
EndNote XML
Nuriyev, Elkhan
.
"
How the West Helps Putin Fulfill His CIS Strategy
."
The Moscow Times
(2014).
Google Scholar
RTF
EndNote XML
Bhalla, Gaurav
.
"
How to plan and manage a project to co-create value with stakeholders
."
Strategy & Leadership
42, no. 2 (2014): 19-25.
Google Scholar
RTF
EndNote XML
Heiges, Mike
,
Rob Bever
, and
Kyle Carnahan
.
How to Safely Flight Test a UAV Subject to Cyber-Attacks
In
Cyber Defence Situation Awareness Symposium (STO-MP-IST-999),
., 2014.
Google Scholar
RTF
EndNote XML
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack
. HP News, 2014.
Google Scholar
RTF
EndNote XML
Human Development Index – Countries
. United Nations, 2014.
Google Scholar
RTF
EndNote XML
Hai-Jew, S.
.
"
Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis
." In
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
, 1260-1294 ., 2014.
Google Scholar
RTF
EndNote XML
Solana, Javier
.
A Human Security Doctrine for Europe: The Barcelona Report of the Study Group on Europe’s Security Capabilities
In
Presented to EU Representative for Common and Security Policy
. Study Group on Europe’s Security Capabilities, 2014.
Google Scholar
RTF
EndNote XML
The Huthis: From Saada to Sanaa
. International Crisis Group, 2014.
Google Scholar
RTF
EndNote XML
Malekpour, Milad
,
Maryam Khademi
, and
Behrouz Minae-Bidgoli
.
"
A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems
."
Journal of Computational Intelligence and Electronic Systems
3, no. 1–6 (2014).
Google Scholar
RTF
EndNote XML
Hristov, Neno
.
"
The Hybrid Threats: The New Challenge to the Security Sector (in Bulgarian)
."
Military Journal
121, no. 4 (2014): 111-117.
Google Scholar
RTF
EndNote XML
Horbulin, Volodymyr
.
"
’Hybrid War’ as a key tool for Russian geostrategy of revenge
."
Strategic Priorities
4 (2014): 5.
Google Scholar
RTF
EndNote XML
"
Hybrid Warfare: Briefing to the Subcommittee on Terrorism, Unconventional Threats and Capabilities
." Committee on Armed Services, House of Representatives, 2014.
Google Scholar
RTF
EndNote XML
Lyutskanov, Emil
.
"
The Hybrid 'Wars': Reflection and an Integral Component of the Global Security Environment (in Bulgarian)
."
Military Journal
121, no. 4 (2014): 102-110.
Google Scholar
RTF
EndNote XML
Bhatt, Devika
.
"
I’ll Do Jail, Says Nun, 84, Who Broke into Nuclear Warhead Site
."
The Times
(2014): 34.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
249
250
251
252
253
254
255
256
257
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance