Biblio

Export 21404 results:
2014
Alnatheer, Mohammed A.. "Secure Socket Layer (SSL) Impact on Web Server Performance." Journal of Advances in Computer Networks 2, no. 3 (2014): 211-217.
Muftić, Lisa. "Securing the Border in Bosnia and Herzegovina: An Exploratory Analysis of the Impact of Training on Officers' Knowledge and Experiences Related to Sex Trafficking." European Journal on Criminal Policy & Research 20, no. 2 (2014): 225-241.
Birdisli, Fikret. "Securitization of Kurdish Question in Turkey." International Journal of Research in Social Sciences 4, no. 2 (2014).
Burnashev, Rustam. "Securitization of Terrorism in Weak States: The Case of Central Asia." In International Conference on “Prospects of EU-Central Asia Relations”. Kazakhstan: Almaty, 2014.
Howorth, Jolyon. Security and Defence Policy in the European Union. Basimgstoke: Palgrave MacMillan, 2014.
Alharbi, Nawaf, Maria Papadaki, and Paul Dowland. "Security challenges of E-government adoption based on end users' perspective ." In The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) ., 2014.
Vasileiadis, Alexios. "Security Concerns and Trust in the Adoption of M-Commerce." Social Technologies 4, no. 1 (2014): 179-191.
Balduzzi, Marco, Alessandro Pasta, and Kyle Wilhoit. A security evaluation of AIS automated identification system In ACSAC '14, 30th Annual Computer Security Applications Conference., 2014.
Alharbi, Nawaf, Maria Papadaki, and Paul Dowland. "Security Factors Influencing End Users’ Adoption of E-Government." Journal of Internet Technology and Secured Transactions (JITST) 3, no. 4 (2014).
Kharchenko, Vyacheslav, Oleg Illiashenko, Eugene Brezhnev, Artem Boyarchuk, and Vladimir Golovanevskiy. "Security Informed Safety Assessment of Industrial FPGA-Based Systems." In Probabilistic Safety Assessment and Management PSAM 12. Honolulu, Hawaii, 2014.
Kharchenko, Vyacheslav S., Oleg A. Illiashenko, and Andriy A. Kovalenko. Security informed safety assessment of NPP I&C systems: GAP-IMECA technique In 22nd International Conference on Nuclear Engineering ICONE22. Prague, Czech Republic, 2014.
Monev, Vesselin. Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014): 2481-2501.
Whitehouse, Ollie. Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond. NCC Group, 2014.
Security Policy 2014. Ministry of Interior, 2014.
Serbia: Progress Report. European Commission, 2014.
Vos, Marita, Henny Schoemaker, and Vilma Liisa Luomaaho. "Setting the agenda for research on issue arenas." Corporate Communications: An International Journal 19, no. 2 (2014): 200-215.
Nafey, Abdul. "The Shale Revolution: Its Impact and Implications for India." Indian Foreign Affairs Journal 9, no. 4 (2014): 370-383.
Reeves, Jeffrey. The Shanghai Cooperation Organisation: A Tenable Provider of Security in Post-2014 Central Asia?. Asia-Pacific Center for Security Studies, 2014.
Baroudi, Sami E.. "Sheikh Yusuf Qaradawi on International Relations: The Discourse of a Leading Islamist Scholar (1926–)." Middle Eastern Studies 50, no. 1 (2014): 2-26.
Mkrtchyan, Tatevik. "Shi 'a politics,“strategic culture” and Iran's relations with the South Caucasus." In Religion, Nation and Democracy in the South Caucasus. Routledge, 2014.
"Should there be a united Ossetia?" The Caucasus Echo (2014).
Significant Cyber Incidents since 2006. CSIS, 2014.
Radkovets, Yuri I.. "Signs of technologies of ‘hybrid war’ in aggressive actions of Russia against Ukraine." Science and Defense 3 (2014): 17-25.
Sebestyénová, Jolana, and Peter Kurdel. "Simulation of Self-organizing Multi-Robotic System used for Area Coverage and Surround of Found Targets ." Wseas Transactions on Environment and Development 11 (2014).

Pages