Biblio

Export 21393 results:
2015
The Stuxnet Worm. Norton by Symantec, 2015.
Ihmouda, Rabia, Najwa Hayaati Mo Alwi, and Ismail Abdullah. "Successful Factors on E-Government Security Social-Technical Aspect." ARPN Journal of Engineering and Applied Sciences 10, no. 20 (2015).
Summit Meetings. NATO, 2015.
Summit website., 2015.
Rougier, Bernard. The Sunni Tragedy in the Middle East. Northern Lebanon from al-Qaeda to ISIS. Princeton, NJ: Princeton University Press, 2015.
Hogan, Michael, and Elaine Newton. Supplemental Information for The Interagency Report On Strategic U.S. Government Engagement In International Standardization To Achieve U.S. Objectives For Cybersecurity., 2015.
Wong, Meghan A., Richard Frank, and Russell Allsup. "The supremacy of online white supremacists – an analysis of online discussions by white supremacists." Information & Communications Technology Law 24, no. 1 (2015).
Surf Safely. IFS-EMMAUS, 2015.
Suruc massacre: ‘Turkish student’ was suicide bomber. BBC News, 2015.
Jeong, Seong Hoon, Hana Kim, Youngsang Shin, Taejin Lee, and Huy Kang Kim. "A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)." Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지) 25, no. 6 (2015): 1525-1540.
Survey of Serbian Public Opinion: November 24 – December 3, 2015. Centre for Insight in Survey Research, 2015.
Survey on Income and Living Conditions – Poverty and Social Inclusion Indicators. National Statistics Institute, 2015.
Uwizera, Ch. "Sustainable Development: International Strategy for Disaster Reduction." In General Assembly. UN General Assembly, 2015.
Molodetska, Kateryna. "Syntez synergetychnogo upravlinnja popytom agentiv na kontent u socialnyh internet-servisah." Informatyka ta matematychni metody v modeljuvanni 5, no. 4 (2015): 330-338.
Syria Calling: Radicalisation in Central Asia In Central Asia Briefing. Bishkek/Brussels: International Crisis Group, 2015.
Lister, Charles. The Syrian Jihad. Al-Qaeda, The Islamic State and the Evolution of an Insurgency. Oxford: Oxford University Press, 2015.
SysSec Network of Excellence Home Page., 2015.
System Analysis & Design – An Object-Oriented Approach with UML. 5th ed. John Wiley & Sons, 2015.
Minchev, Zlatogor, and Luben Boyanov. "System Modelling & Experimental Assessment of IoT Cybethreats in Future Smart Homes." In 5th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE – 2015). Sofia, Bulgaria: UNWE, 2015.
Ormrod, David, Benjamin Turnbull, and Kent O’Sullivan. System of Systems Cyber Effects Simulation Ontology In 2015 Winter Simulation Conference., 2015.
Rahim, Noor Hayani Abd, Suraya Hamid, Laiha Mat Kiah, Shahaboddin Shamshirband, and Steven Furnell. "A Systematic Review of Approaches to Assessing Cybersecurity Awareness." Kybernetes 44, no. 4 (2015): 606-22.
Systems Integration for Industry. Automation.com, 2015.
Hayes, Ben, and Chris Jones. "Tacking Stock: The Evolution, Adoption, Implementation and Evaluation of EU Counter-Terrorism Policy." In The Impact, Legitimacy and Effectiveness of EU Counter-Terrorism, 13-39. Oxon: Routledge, 2015.
TACSO., 2015.
Leonard, Peter. Tajikistan & Kyrgyzstan: Interethnic Clash Shines Light on Fraying Social Fabric. Eurasianet, 2015.

Pages