Biblio

Export 21393 results:
2014
Monev, Vesselin. Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014): 2481-2501.
Whitehouse, Ollie. Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond. NCC Group, 2014.
Security Policy 2014. Ministry of Interior, 2014.
Serbia: Progress Report. European Commission, 2014.
Vos, Marita, Henny Schoemaker, and Vilma Liisa Luomaaho. "Setting the agenda for research on issue arenas." Corporate Communications: An International Journal 19, no. 2 (2014): 200-215.
Nafey, Abdul. "The Shale Revolution: Its Impact and Implications for India." Indian Foreign Affairs Journal 9, no. 4 (2014): 370-383.
Reeves, Jeffrey. The Shanghai Cooperation Organisation: A Tenable Provider of Security in Post-2014 Central Asia?. Asia-Pacific Center for Security Studies, 2014.
Baroudi, Sami E.. "Sheikh Yusuf Qaradawi on International Relations: The Discourse of a Leading Islamist Scholar (1926–)." Middle Eastern Studies 50, no. 1 (2014): 2-26.
Mkrtchyan, Tatevik. "Shi 'a politics,“strategic culture” and Iran's relations with the South Caucasus." In Religion, Nation and Democracy in the South Caucasus. Routledge, 2014.
"Should there be a united Ossetia?" The Caucasus Echo (2014).
Significant Cyber Incidents since 2006. CSIS, 2014.
Radkovets, Yuri I.. "Signs of technologies of ‘hybrid war’ in aggressive actions of Russia against Ukraine." Science and Defense 3 (2014): 17-25.
Sebestyénová, Jolana, and Peter Kurdel. "Simulation of Self-organizing Multi-Robotic System used for Area Coverage and Surround of Found Targets ." Wseas Transactions on Environment and Development 11 (2014).
Sebestyénová, Jolana, and Peter Kurdel. "Simulation of Self-organizing Multi-Robotic System used for Area Coverage and Surround of Found Targets ." Wseas Transactions on Environment and Development 11 (2014).
Westenberger, Antje. Simultane Zustands- und Existenzsch¨atzung mit chronologisch ungeordneten Sensordaten f¨ur die Fahrzeugumfelderfassung In Fakult¨at f¨ur Ingenieurwissenschaften und Informatik. Vol. Doktor-Ingenieurs. Universit¨at Ulm, 2014.
J. Castro-Arvizu, Manuel, Jordi Vil-Valls, Pau Closas, and Juan A. Fern´andez-Rubio. "Simultaneous tracking and RSS model calibration by robust filtering." In 2014 48th Asilomar Conference on Signals, Systems and Computers., 2014.
J. Castro-Arvizu, Manuel, Jordi Vilà-Valls, and Pau Closas. "Simultaneous tracking and RSS model calibration by robust filtering ." In 2014 48th Asilomar Conference on Signals, Systems and Computers ., 2014.
SKIL 3. Sterman-Kaiser Imaging Lab Data Base 3, 2014.
Smart Defence, NATO A-Z., 2014.
SGC Committee. Smart Grid Cybersecurity Strategy Architecture and High-Level Requirements In The Smart Grid Interoperability Panel, Technical Report ., 2014.
Smarter Smart Defence: Multinational Cooperation facilitated In NEDP project report, NATO HQ. NCI Agency and NSPA, 2014.
Corcoran, Mark. Sochi Winter Olympics: Terrorist Threat Hangs Over Games as ‘Combat-Ready’ Vladimir Putin Steps Up Security., 2014.
Schwarzer, Ralf, Rosemarie M. Bowler, and James E. Cone. "Social Integration Buffers Stress in New York Police after the 9/11 Terrorist Attack." Anxiety, Stress, and Coping 27, no. 1 (2014): 18-26.
Duijn, Paul A. C., and Peter P. H. M. Klerks. "Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement." In Networks and Network Analysis for Defence and Security, 121-159. Cham: Springer International Publishing, 2014.

Pages