Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2014
Dolan, Chris
.
"
Has Patriarchy Been Stealing the Feminists’ Clothes? Conflict-Related Sexual Violence and UN Security Council Resolutions
."
IDS Bulletin
45 , no. 1 (2014).
DOI
Google Scholar
RTF
EndNote XML
Fjäder, Christian
.
"
he Nation-State, National Security and Resilience in the Age of Globalisation
."
Resilience
2, no. 2 (2014): 114-129.
DOI
Google Scholar
RTF
EndNote XML
Ravish, Deepika
,
Nayana R. Shenoy
,
K. Shanthi
, and
S. Nisargh
.
Heart function monitoring, prediction and prevention of heart attacks: Using artificial neural networks
In
2014 International Conference on Contemporary Computing and Informatics (IC3I)
., 2014.
Google Scholar
RTF
EndNote XML
Heavy metals in the components of the environment Mariupol City: Ecological and geochemical aspects (in Ukrainian)
. Kiev: Interservis, 2014.
Google Scholar
RTF
EndNote XML
Jamah, Ally
.
Heavy-handed Counter-Terrorism Tactics Added Pepper to Injury This Year
. Standard Digital News, 2014.
Google Scholar
RTF
EndNote XML
Masi, Alessandria
.
"
Here’s How ISIS Recruits Westerners
."
Business Insider
(2014).
Google Scholar
RTF
EndNote XML
Bienaimé, Pierre
.
"
Here’s Why So Many of Tunisia’s Youth Are Drawn to ISIS
."
Business Insider, last modified
(2014).
Google Scholar
RTF
EndNote XML
Mantoux, Stéphane
.
Hide These Jihadists That I Can’t See: The French Volunteers In Syria
. Jihadology, 2014.
Google Scholar
RTF
EndNote XML
High Representative of the Union for Foreign Affairs and Security Policy
., 2014.
Google Scholar
RTF
EndNote XML
Barlow, Caleb
.
"
Highlights and Insights
." In
RSA 2014 Conference
., 2014.
Google Scholar
RTF
EndNote XML
How a Georgian sergeant became a Jihad leader in Iraq
. Vol. 8 July 2014. BBC (Russian Service), 2014.
Google Scholar
RTF
EndNote XML
Karadsheh, Jomana
,
Jim Sciutto
, and
Laura Smith-Spark
.
How Foreign Fighters Are Swelling ISIS Ranks in Startling Numbers
. CNN, 2014.
Google Scholar
RTF
EndNote XML
Ajbaili, Mustapha
.
How ISIS Conquered Social Media
. Al Arabiya News, 2014.
Google Scholar
RTF
EndNote XML
J.M., Berger
.
How ISIS Games Twitter
., 2014.
Google Scholar
RTF
EndNote XML
Pomerantsev, Peter
.
"
How Russia Is Revolutionizing Information Warfare
."
Defense One
(2014).
Google Scholar
RTF
EndNote XML
Read, Oliver
.
"
How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage
." In
Cyberspace and International Relations
, 203-230 . Berlin, Heidelberg : Springer, 2014.
Google Scholar
RTF
EndNote XML
Dokos, Thanos
.
"
How the EU got it so Wrong in Ukraine
."
Europe’s World
(2014).
Google Scholar
RTF
EndNote XML
Galeotti, Mark
.
"
How the Invasion of Ukraine Is Shaking Up the Global Crime Scene
."
Vice News
(2014).
Google Scholar
RTF
EndNote XML
Nuriyev, Elkhan
.
"
How the West Helps Putin Fulfill His CIS Strategy
."
The Moscow Times
(2014).
Google Scholar
RTF
EndNote XML
Bhalla, Gaurav
.
"
How to plan and manage a project to co-create value with stakeholders
."
Strategy & Leadership
42, no. 2 (2014): 19-25.
Google Scholar
RTF
EndNote XML
Heiges, Mike
,
Rob Bever
, and
Kyle Carnahan
.
How to Safely Flight Test a UAV Subject to Cyber-Attacks
In
Cyber Defence Situation Awareness Symposium (STO-MP-IST-999),
., 2014.
Google Scholar
RTF
EndNote XML
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack
. HP News, 2014.
Google Scholar
RTF
EndNote XML
Human Development Index – Countries
. United Nations, 2014.
Google Scholar
RTF
EndNote XML
Hai-Jew, S.
.
"
Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis
." In
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
, 1260-1294 ., 2014.
Google Scholar
RTF
EndNote XML
Solana, Javier
.
A Human Security Doctrine for Europe: The Barcelona Report of the Study Group on Europe’s Security Capabilities
In
Presented to EU Representative for Common and Security Policy
. Study Group on Europe’s Security Capabilities, 2014.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
249
250
251
252
253
254
255
256
257
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance