Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2015
Duggan, Patrick M.
.
"
Strategic Development of Special Warfare in Cyberspace
."
Joint Force Quarterly
79 (2015).
Google Scholar
RTF
EndNote XML
Turner, John
.
"
Strategic Differences: Al Qaeda’s Split with the Islamic State of Iraq and al-Sham
."
Small Wars and Insurgencies
26, no. 2 (2015): 208-25, 216-17.
Google Scholar
RTF
EndNote XML
Tolipov, Farkhod
.
"
Strategic Implications of the War in Ukraine for the Post-Soviet Space: A View from Central Asia
."
Connections: The Quarterly Journal
14, no. 4 (2015): 11-20.
DOI
Google Scholar
RTF
EndNote XML
Torp, Simon M.
.
"
The Strategic Turn in Communication Science: On the History and Role of Strategy in Communication Science from Ancient Greece
." In
The Routledge Handbook of Strategic Communication
, 24. New York, London: Routledge, Taylor and Francis Group, 2015.
Google Scholar
RTF
EndNote XML
The Strategy for Combating Organized Crime 2014-2016
., 2015.
Google Scholar
RTF
EndNote XML
Kane, Gerald
,
Doug Palmer
,
Anh Nguyen Phillips
,
David Kiron
, and
Natasha Buckley
.
"
Strategy, not Technology, Drives Digital Transformation: Becoming a Digitally Mature Enterprise
."
IT Sloan Management Review
(2015): July 14, 2015.
Google Scholar
RTF
EndNote XML
Nowakowska-Krystman, Aneta
.
"
The Strategy of the Armed Forces based on Core Competencies
."
Science & Military Journal
10, no. 2 (2015): 54-63.
Google Scholar
RTF
EndNote XML
Structural Equation Modeling, Dell Statistics Textbook
., 2015.
Google Scholar
RTF
EndNote XML
Manjula, D.
, and
J. Thilagavathi
.
"
Study on False Positive Reduction i n Unbalanced Datasets through SVM Using Cost Based Learning
."
International Journal of Trend in Research and Development
2(6), (2015).
Google Scholar
RTF
EndNote XML
Manjula, D.
, and
J. Thilagavathi
.
"
A Study on False Positive Reduction in Unbalanced Datasets through SVM Using Cost Based Learning
."
International Journal of Trend in Research and Development
2, no. 6 (2015).
Google Scholar
RTF
EndNote XML
United Nations Office on Drugs and Crime
.
Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
. Vienna, 2015.
Google Scholar
RTF
EndNote XML
The Stuxnet Worm
. Norton by Symantec, 2015.
Google Scholar
RTF
EndNote XML
Ihmouda, Rabia
,
Najwa Hayaati Mo Alwi
, and
Ismail Abdullah
.
"
Successful Factors on E-Government Security Social-Technical Aspect
."
ARPN Journal of Engineering and Applied Sciences
10, no. 20 (2015).
Google Scholar
RTF
EndNote XML
Summit Meetings
. NATO, 2015.
Google Scholar
RTF
EndNote XML
Summit website
., 2015.
Google Scholar
RTF
EndNote XML
Rougier, Bernard
.
The Sunni Tragedy in the Middle East. Northern Lebanon from al-Qaeda to ISIS
. Princeton, NJ: Princeton University Press, 2015.
Google Scholar
RTF
EndNote XML
Hogan, Michael
, and
Elaine Newton
.
Supplemental Information for The Interagency Report On Strategic U.S. Government Engagement In International Standardization To Achieve U.S. Objectives For Cybersecurity
., 2015.
DOI
Google Scholar
RTF
EndNote XML
Wong, Meghan A.
,
Richard Frank
, and
Russell Allsup
.
"
The supremacy of online white supremacists – an analysis of online discussions by white supremacists
."
Information & Communications Technology Law
24, no. 1 (2015).
Google Scholar
RTF
EndNote XML
Surf Safely
. IFS-EMMAUS, 2015.
Google Scholar
RTF
EndNote XML
Suruc massacre: ‘Turkish student’ was suicide bomber
. BBC News, 2015.
Google Scholar
RTF
EndNote XML
Jeong, Seong Hoon
,
Hana Kim
,
Youngsang Shin
,
Taejin Lee
, and
Huy Kang Kim
.
"
A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)
."
Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지)
25, no. 6 (2015): 1525-1540.
Google Scholar
RTF
EndNote XML
Survey of Serbian Public Opinion: November 24 – December 3, 2015
. Centre for Insight in Survey Research, 2015.
Google Scholar
RTF
EndNote XML
Survey on Income and Living Conditions – Poverty and Social Inclusion Indicators
. National Statistics Institute, 2015.
Google Scholar
RTF
EndNote XML
Uwizera, Ch
.
"
Sustainable Development: International Strategy for Disaster Reduction
." In
General Assembly
. UN General Assembly, 2015.
Google Scholar
RTF
EndNote XML
Molodetska, Kateryna
.
"
Syntez synergetychnogo upravlinnja popytom agentiv na kontent u socialnyh internet-servisah
."
Informatyka ta matematychni metody v modeljuvanni
5, no. 4 (2015): 330-338.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
225
226
227
228
229
230
231
232
233
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance