Biblio

Export 21372 results:
2016
Avramov, Kiril. The Putin Administration's Use of 'Conspiracy Theories' against Former Communist States. The Case of Bulgaria. Southeastern Europe, Brill, 2016.
Lukyanov, Fyodor. "Putin’s Foreign Policy: The Quest to Restore Russia’s Rightful Place." Foreign Affairs 95, no. 3 (2016): 33-34.
Galeotti, Mark. Putin's Hydra: Inside Russia's Intelligence Services. European Council on Foreign Relations, 2016.
Van Herpen, Marcel H.. Putin's Propaganda Machine: Soft Power and Russian Foreign Policy. Rowman & Littlefield, 2016.
ash-Shāmī, Abū Maysarah. "The Qā’idah of Adh-Dhawāhirī, and An-Nadhārī, and the Absent Yemenī Wisdom." Dabiq, Issue 6 (2016): 16-25.
Prezelj, Iztok, Erik Kopač, Aleš Žiberna, Anja Kolak, and Anton Grizold. "Quantitative monitoring of military transformation in the period 1992–2010: Do the protagonists of transformation really change more than other countries?" Defence Studies Volume 16, no. 1 (2016): 20-46.
Mukhopadhay, Kishalaya. "Queering the Narrative: Can the Subaltern Sex Speak?" Economic & Political Weekly 51, no. 2 (2016): 20-23.
Carati, Andrea. "R2P, NATO and the Problem of Who Should Intervene?" In TSA 15th Annual Conference 2016 – University of Plymouth., 2016.
Meserole, Chris. "Radicalization, Laïcité, and the Islamic Veil." Regional (2016).
Choudhary, Pankaj, and Upasna Singh. "Ranking Terrorist Nodes of 26/11 Mumbai Attack using Analytical Hierarchy Process with Social Network Analysis." In 11th Annual Simposium on Information Assurance (Asia’16). Albany, NY, 2016.
Assaker, Rana. The Rapid Rise of the Islamic State in Syria: When State Weakness, Identity Politics and Regional Vacuum of Power Collide In International Affairs. Vol. Master of Arts . Lebanese American University, 2016.
Benoudnine, Hadjira, Abdelkrim Meche, Mokhtar Keche, Abdelaziz Ouamri, and Malcolm S. Woolfson. "Real time Hough transform based track initiators in clutter." Information Sciences 337–338 (2016): 82-92.
Omotosho, Adebayo, Omotanwa Adegbola, and Michael Edobor. "Reanalyzing Li and Tao. (2014): Investigating Algorithm Recognition on Dark Irises." International Journal of Computer Applications (0975 – 8887) 155, no. 10 (2016).
Barker, Elaine. Recommendation for Key Management In NIST Special Publication., 2016.
Lange-Ionatamišvili, Elīna. Redefining Euro-Atlantic Values: Russia’s Manipulative Techniques. Riga: NATO Strategic Communications Centre of Excellence, 2016.
Kayaalp, Ebru, and Jack Jurich. "Redefining Propaganda in the Internet Age: Social Media Wars between ISIS and the US ." In 2016 International Conference on Social Media & Society., 2016.
Tagarev, Todor. "Reflecting Developments in Hybrid Warfare into Defence Policy." In Countering Hybrid Threats: Lessons Learned from Ukraine, 27-33. Amsterdam: IOS Press, 2016.
Värnqvist, Peter. Reflexiv kontroll: evig metod som systematiserats?. Stockholm: Swedish National Defence College, 2016.
Värnqvist, P. Reflexiv kontroll: evig metod som systematiserats? In Självständigt arbete krigsvetenskap., 2016.
Regulation (EU) 2016/679 of the European Parliament and of the Council., 2016.
Shlapak, David A., and Michael V. Johnson. Reinforcing Deterrence on Nato’s Eastern Flank. RAND Corporation, 2016.
Čajić, Jasmin. "The Relevance of Clausewitz’s Theory of War to Contemporary Conflict Resolution." Connections: The Quarterly Journal 15, no. 1 (2016): 72-78.
Rodrigues, Luis, Joel Guerreiro, and Noélia Correia. "RELOAD/CoAP Architecture with Resource Aggregation/Disaggregation Servic." In 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Valencia, 2016.
"Remaining and expanding." Dabiq 5 (2016): 20-33.
Pyatt, Geoffrey. Remarks by Ambassador Pyatt at the “Countering Information War in Ukraine” In Speeches and Interviews by Ambassador Geoffrey R. Pyatt – Embassy of the USA in Ukraine, Conference, January 29, 2016., 2016.

Pages