Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2017
McKew, Molly K.
.
"
The Gerasimov Doctrine
."
Politico
(2017).
Google Scholar
RTF
EndNote XML
Nazriev, Sairakhmon
.
Glava Hatlona obespokoen bolshim kolichestvom bokhtarcev v Sirii (Head of Hatlon is concerned with a large number of bokhtars in Syria)
. Asia-Plus, 2017.
Google Scholar
RTF
EndNote XML
Global Fire Power Index
. GlobalFirepower.com, 2017.
Google Scholar
RTF
EndNote XML
Global Peace Index 2017 Measuring Peace in a Complex World
., 2017.
Google Scholar
RTF
EndNote XML
Quisumbing, Lowell A.
.
"
Global Perspectives on Cyber security Using Latent Dirichlet Allocation Algorithm
."
International Journal of Applied Engineering Research
12, no. 20 (2017): 10310-10323.
Google Scholar
RTF
EndNote XML
Global Ransomware Attack Causes Turmoil
. BBC News Ukraine, 2017.
Google Scholar
RTF
EndNote XML
Lewis, Paul Simon
.
The Global Vulnerability Discovery and Disclosure System: A Thematic System Dynamics Approach
In
Cranfield Defence and Security
. Vol. PhD. Cranfield University, 2017.
Google Scholar
RTF
EndNote XML
Poushter, Jacob
, and
Dorothy Manevich
.
Globally, People Point to ISIS and Climate Change as Leading Security Threats
. Pew Research Center, 2017.
Google Scholar
RTF
EndNote XML
Filipenok, Artem
, and
Anjelika Basisini
.
A Group Connected to Al-Qaeda Claimed Responsibility for the Terrorist Act in the Underground
. RBK (in Russian), 2017.
Google Scholar
RTF
EndNote XML
Guarda Nacional Republicana (Portugal)
., 2017.
Google Scholar
RTF
EndNote XML
Besenyő, János
.
"
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
."
Connections: The Quarterly Journal
16, no. 3 (2017): 23-45.
DOI
Google Scholar
RTF
EndNote XML
G. Kumar, Saroj
,
Ratna Ghosh
,
Debasish Ghose
, and
A. Vengadarajan
.
"
Guidance of Seekerless Interceptors Using Innovation Covariance Based Tuning of Kalman Filters
."
Journal of Guidance, Control, and Dynamics
40, no. 3 (2017): 603-614.
Google Scholar
RTF
EndNote XML
Androulidakis, Iosif
.
"
Guidelines on a Mobile Security Lab Course
."
Information & Security: An International Journal
37 (2017): 35-44.
DOI
Google Scholar
RTF
EndNote XML
Weir, Matt
.
Hacking 400,000 passwords, or explaining to a roommate why your electricity bill went up
. Defcon 17, 2017.
Google Scholar
RTF
EndNote XML
Joscelyn, Thomas
.
"
Hay’at Tahrir al Sham Leader Calls for ‘Unity’ in Syrian Insurgency
."
FDD’s Long War Journal
(2017).
Google Scholar
RTF
EndNote XML
Dunn, Sarah
, and
Sean Wilkinson
.
"
Hazard Tolerance of Spatially Distributed Complex Networks
."
Reliability Engineering & System Safety
157 (2017): 1-12.
Google Scholar
RTF
EndNote XML
Skovgaard-Petersen, Jakob
.
"
Heirs of Abu Bakr: On the Ideology and Conception of History in al-Qaeda and Islamic State
."
Connections: The Quarterly Journal
16, no. 1 (2017): 25-36.
DOI
Google Scholar
RTF
EndNote XML
MIC
.
Heisei 28 Nen Jyoho Tsushin Media no Riyou Jikan to Jyoho Koudou ni Kansuru Chosa [Research for the Length of Time and Behavior to Use Communication Media]
., 2017.
Google Scholar
RTF
EndNote XML
Sunaert, Willem
.
Het militaire beleid van de VS in de Aziatisch-Pacifische regio tijdens de Obama-administratie: Een analyse a.d.h.v. het offensief realism
In
Politieke Wetenschappen afstudeerrichting Internation
. Vol. master. Gent: Universiteit Gent, 2017.
Google Scholar
RTF
EndNote XML
Middleton, Bruce
.
A History of Cyber Security Attacks: 1980 to Present
. New York: Auerbach Publications, 2017.
Google Scholar
RTF
EndNote XML
Pawlak, Patryk
.
"
Horizontal Issues
." In
After the EU Global Strategy – Building Resilience
, 17. Paris: European Union, Institute for Security Studies, 2017.
Google Scholar
RTF
EndNote XML
Dua, Rohan
.
House Panel on Pathankot Attack Puts Punjab Police SP Salwinder Singh Under Cloud
. The Times of India, 2017.
Google Scholar
RTF
EndNote XML
Islam, Rabiul
,
Greg Walkerden
, and
Marco Amati
.
"
Households’ Experience of Local Government during Recovery from Cyclones in Coastal Bangladesh: Resilience, Equity, and Corruption
."
Natural Hazards
85, no. 1 (2017): 361-378.
Google Scholar
RTF
EndNote XML
Balding, Christopher
.
"
How Badly Is China’s Great Firewall Hurting the Country’s Economy?
"
Foreignpolicy
(2017).
Google Scholar
RTF
EndNote XML
Major, Claudia
, and
Christian Mölling
.
How Germany Should Change Its Approach to Arms Control
. Carnegie Europe, 2017.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
126
127
128
129
130
131
132
133
134
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance