Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21386 results:
RTF
EndNote XML
2016
Schneier, Bruce
.
The Internet of Things Talks About You Behind Your Back
., 2016.
Google Scholar
RTF
EndNote XML
Adriano, Andreas
, and
Hunter Monroe
.
"
The Internet of Trust
."
Finance & Development
53, no. 2 (2016).
Google Scholar
RTF
EndNote XML
Interview of President Plevneliev for the BBC
., 2016.
Google Scholar
RTF
EndNote XML
"
Interview with the Wali of Khurasan
."
Dabiq
, no. 13 (2016): 48-58.
Google Scholar
RTF
EndNote XML
Engels, Sebastian
.
Interviews with U.S. Embassy personnel
. Astana, Kazakhstan, 2016.
Google Scholar
RTF
EndNote XML
Cielen, Davy
,
Arno Meysman
, and
Mohamed Ali
.
Introducing Data Science. Big Data, Machine Learning, and More, Using Python Tools
. Manning Publications Co., 2016.
Google Scholar
RTF
EndNote XML
Cielen, Davy
,
Arno D. B. Meysman
, and
Mohamed Ali
.
Introducing Data Science: Big Data, Machine Learning, and More, Using Python Tools
. Shelter Island, NY: Manning, 2016.
Google Scholar
RTF
EndNote XML
Garro, Alfredo
, and
Alberto Falcone
.
"
An introduction to the SEE HLA Starter Kit
." In
Spring Simulation Multi-Conference (SpringSim'16)
., 2016.
Google Scholar
RTF
EndNote XML
Martsenyuk, Tamara
,
Ganna Grytsenko
, and
Anna Kvi
.
"
The “Invisible Battalion”: Women in ATO Military Operations in Ukraine
."
Kyiv-Mohyla Law and Politics Journal
, no. 2 (2016).
Google Scholar
RTF
EndNote XML
White, Greg
, and
Rick Lipsey
.
ISAO SO Product Outline
. ISAO Standards Organization, 2016.
Google Scholar
RTF
EndNote XML
Gerges, Fawaz A.
.
ISIS. A History
. Princeton, NJ: Princeton University Press, 2016.
Google Scholar
RTF
EndNote XML
Sanchez, Ray
,
Tim Lister
,
Mark Bixler
,
Sean O’Key
,
Michael Hogenmiller
, and
Mohammed Tawfeeq
.
ISIS goes global: 143 attacks in 29 countries have killed about 2,043 people
. CNN International Edition, 2016.
Google Scholar
RTF
EndNote XML
ISIS supporters claim group responsible for Brussels attacks: ‘We have come to you with slaughter’
. Independent, 2016.
Google Scholar
RTF
EndNote XML
W. Durham, Cole
, and
Tore Lindholm
.
Islam and Political-Cultural Europe
. Routledge, 2016.
Google Scholar
RTF
EndNote XML
Istanbul airport bombers were Russian, Uzbek, Kyrgyz: Turkish official
. Reuters, 2016.
Google Scholar
RTF
EndNote XML
Yeginsu, Ceylan
, and
Victor Homola
.
"
Istanbul Bomber Entered as a Refugee, Turks Say
."
The New York Times
(2016).
Google Scholar
RTF
EndNote XML
Koprivica, Veseljko
.
Istraga o pokušaju ‘državnog udara’ u Crnoj Gori [An Investigation into the Attempt of a ‘State Strike’ in Montenegro]
. Aljazeera Balkans, 2016.
Google Scholar
RTF
EndNote XML
Tasevski, Predrag
.
"
IT and Cyber Security Awareness – Raising Campaigns
."
Information & Security: An International Journal
34, no. 1 (2016): 7-22.
DOI
Google Scholar
RTF
EndNote XML
ITACS
., 2016.
Google Scholar
RTF
EndNote XML
The Italian Mafia
., 2016.
Google Scholar
RTF
EndNote XML
Mullins, Sam
.
"
Jihadist Foreign Fighters and ‘Lone Wolf’ Terrorism
." In
Combating Transnational Terrorism
, 115-130. Sofia: Procon, 2016.
DOI
Google Scholar
RTF
EndNote XML
Commission, The European
.
Joint Communication to the European Parliament and the Council: Joint Framework on countering hybrid threats a European Union response
. Brussels, 2016.
Google Scholar
RTF
EndNote XML
Joint Declaration by the President of the European Council, the President of the European Commission, and the Secretary General of NATO
. Warsaw, 2016.
Google Scholar
RTF
EndNote XML
Joint Framework on Countering Hybrid Threats
In
High Representative of the Union for Foreign Affairs and Security Policy
. Brussels, 2016.
Google Scholar
RTF
EndNote XML
Avooske, Jonathan
.
Joint Improvised-Threat Defeat Agency (JIDA) Technology Development/Identification, Acquisition and Support: An Exploratory Case Study
. Northcentral University, 2016.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
160
161
162
163
164
165
166
167
168
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance