Biblio

Export 21372 results:
2015
Li, Xingan, and Martti Juhola. "Country crime analysis using the self-organising map, with special regard to economic factors ." International Journal of Data Mining, Modelling and Management 7, no. 2 (2015).
Country Profile: Lithuania - Disaster management structure, Vademecum - Civil Protection., 2015.
Crash of Malaysia Airlines Flight Mh17 In The Hague: Dutch Safety Board. Dutch Safety Board, 2015.
Spinu, Natalia. "Creating and Strengthening Cybersecurity in the Republic of Moldova." Information & Security: An International Journal 32, no. 2 (2015): 97-108.
Li, Xingan, Henry Joutsijoki, Jorma Laurikkala, and Martti Juhola. Crime vs. demographic factors revisited: Application of data mining methods In Webology., 2015.
Li, Xingan, Henry Joutsijoki, Jorma Laurikkala, and Martti Juhola. "Crime vs. Demographic Factors Revisited: Application of Data Mining Methods." Webology 12, no. 1 (2015).
Bigg, Claire. Crimea Visit Spotlights Kremlin Sympathies Beyond French Fringes. Radio Free Europe / Radio Liberty, 2015.
Blockmans, Steven, and Giovanni Faleg. "Crises in the Neighbourhood Should Push CSDP Forward." European Neighbourhood Watch 113 (2015).
Thiele, Ralph D.. "Crisis in Ukraine – The Emergence of Hybrid Warfare." ISPSW Strategy Series (2015).
Crisis Management and Disaster Response Centre of Excellence., 2015.
Holbrook, D.. "A critical analysis of the role of the internet in the preparation and planning of acts of terrorism." Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide 4, no. 2 (2015): 121-133.
Mureşan, Liviu, and Alexandru Georgescu. "Critical infrastructure protection – Romanian contributions and experiences (in Ukrainian)." In Zelena knyha z pytan zakhystu kritychoy infrastructuru, 93-106 . Kyiv: NISS, 2015.
Tagarev, Todor. Critical Infrastructure Protection: The Challenge of Establishing Interagency Cooperation., 2015.
Tagarev, Todor. "Critical Infrastructure Protection: the Challenges of Establishing Interagency Cooperation (in Ukrainian)." In Zelena knyha z pytan zakhystu kritychoy infrastructuru, 158-161. Kyiv: NISS, 2015.
Grierson, Jamie, and Matthew Weaver. "Croatia Moves Refugees to Hungarian Border – As It Happened." The Guardian (2015).
Adamsky, Dmitry. Cross-Domain Coercion: The Current Russian Art of Strategy. Institute of International Relations, 2015.
Crude Oil Prices Down Sharply in Fourth Quarter of 2014. U.S. Energy Information Administration, 2015.
Kim, Inwook. Crude Security: Oil, Armament, and Alliance. Vol. Ph.D. Political Science . The George Washington University, 2015.
Cheng, Qingfeng, and Chunming Tang. "Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round." International Journal of Network Security 17, no. 6 (2015): 678-682.
D., Harinath, Ramana M.V., and Chitra B.. "Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 7 (2015): 680-6.
Howorth, Jolyon. "The CSDP without the UK: bad for Europe but even worse for Britain." In The Common Security and Defence Policy: National Perspectives. Brussels: The Royal Institute for International Relations, 2015.
CSIRTs by Country - Interactive Map. ENISA, 2015.
Mello, Alexandre, and Michael Knights. "The Cult of the Offensive: The Islamic State on Defense." CTC Sentinel 8, no. 4 (2015): 1-6.
Customer Service Catalogue, Part I: Customer Handbook. NCI Agency, 2015.
Porobić, Miralem, and Mirsad Bajraktarević. Cyber crime, pranje novca i finansijske istrage., 2015.

Pages