Biblio

Export 21404 results:
2015
Sushentsov, Andrey. "Russian ‘Hybrid War’: Nothing New (in Russian)." Foreign Policy (2015).
Masters, Jonathan. The Russian Military. Council on Foreign Relations, 2015.
Russian National Security Strategy 2015-2020., 2015.
Goble, Paul. "Russian Think Tank That Pushed for Invasion of Ukraine Wants Moscow to Overthrow Lukashenka." Eurasia Daily Monitor (2015).
Schreck, Carl. Russian TV Deserters Divulge Details On Kremlin’s Ukraine ‘Propaganda’. Radio Free Europe / Radio Liberty, 2015.
S.1869, The Federal Cybersecurity Enhancement Act of 2015., 2015.
Vandiver, John. "SACEUR: Allies Must Prepare for ‘Hybrid Warfare'." Stars and Stripes (2015).
Safer Internet Day., 2015.
Saferworld Briefing: Reviving Conflict Prevention in 1325. London: Saferworld, 2015.
Niculescu, George Vlad. "Sailing the South Caucasus through Troubled Waters towards Regional Integration." Connections: The Quarterly Journal 14, no. 2 (2015): 65-75.
Paraszczuk, Joanna. Salakhuddin Shishani Swears Bay’ah to New CE Emir. From Chechnya to Syria, 2015.
Tagarev, Todor, and Valeri Ratchev. Scenario and ambitions for managing a trans-border political-military crisis: Implications for Bulgaria’s Defence Policy In CSDM Views., 2015.
Ferrari, Andrea C.. "Science and Technology Roadmap for Graphene, Related Two-dimensional Crystals, and Hybrid Systems." Nanoscale 7, no. 11 (2015).
Gartrell, Adam, Natalie O’Brien, and Michael Bachelard. "Secret Grants for Countering Violent Extremism Programs Split Communities." Sydney Morning Herald (2015).
House, White. Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts In The White House., 2015.
Lupu, Catalin, Valeriu Lupu, and Gîlc Gheorghe. Securing online banking services using iris recognition In Annals of the "Constantin Brancusi" University of Targu Jiu, Engineering Series., 2015.
Wrona, Konrad. Securing the Internet of Things a military perspective In IEEE 2nd World Forum on Internet of Things (WF-IoT). Milan, Italy, 2015.
Lu, Tianbo, Jiaxi Lin, Lingling Zhao, Yang Li, and Yong Peng. "A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields." International Journal of Security and Its Applications 9, no. 7 (2015): 1-16.
Rettman, Andrew. Security fears prompt fences on EU-Russia border. EUobserver, 2015.
Minchev, Zlatogor. Security Foundations in Cyber Space, Training Course Selected Materials., 2015.
Azim, Muzaffar, and Kazim S. Naqvi. "A Security Framework for Cloud Based Egovernance System." International Journal of Science, Technology & Management 4, no. 2 (2015).
Seismological Observatory of the Hungarian Academy of Sciences., 2015.
Ridland, Andrew. Seizing the Digital High Ground: Military Operations and Politics in the Social Media Era In Joint Forces Staff College, Joint Advanced Warfighting School. Vol. Master of Science in Joint Campaign Plannin. National Defense University, British Army, 2015.
Semtech: AN1200.22 - LoRa Modulation Basics ., 2015.
Semtech: ANNWS.01.2.1.W.SYS - LoRaWAN Network Server Demonstration: Gateway to Server Interface Definition In Revision 1.0., 2015.

Pages