Biblio

Export 21386 results:
2016
Government Technology., 2016.
Lebichot, Bertrand, Fabian Braun, Olivier Caelen, and Marco Saerens. A graph-based, semi-supervised, credit card fraud detection system In Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence. Vol. 693. Cham: Springer, 2016.
Maiti, Chinmay, and Bibhas Chandra Dhara. "A grayscale watermark technique using sub-sampling and singular value decomposition." In International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Chennai, India , 2016.
Zahid, Farhan. "Growing Evidence of Islamic State in Pakistan." Terrorism Monitor 14, no. 3 (2016): 3-5.
Growth of IT-specialists Quantity on the Separate Types of the Certification Programs. Monster Blog, 2016.
Guide to Cyber Threat Information Sharing In NIST Special Publication . Gaithersburg, MD: National Institute of Standards and Technology, 2016.
Johnson, Chris, Lee Badger, David Waltermire, Julie Snyder, and Clem Skorupka. Guide to Cyber Threat Information Sharing In Special Publication. National Institute of Standards and Technology (NIST), 2016.
Shoemaker, Dan, Anne Kohnke, and Ken Sigler. A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce 2.0 . Boca Raton, FL: CRC Press, 2016.
Standish, Reid. "Hacked: Putin Aide’s Emails Detail Alleged Plot to Destabilize Ukraine." Foreign Policy (2016).
"Hamburg Declaration of the Incoming OSCE Troika: A Strong OSCE for a Secure Europe." In OSCE Twenty-Third Meeting of the Ministerial Council 8 and 9 December 2016, MC.GAL/11/16., 2016.
Ololube, Nwachukwu Prince. Handbook of Research on Organizational Justice and Culture in Higher Education Institutions. Nigeria: Ignatius Ajuru University of Education, 2016.
Ocak, Metin. "Hangi Öğeler Ulusal Güvenlik Strateji Belgelerini Oluşturmalıdır? Bir İçerik Analizi." Science Journal of Turkish Military Academy Haziran 26, no. 1 (2016): 23-49.
Turčaník, Michal, and Javurek Martin. "Hash Function Generation by Neural Network." In 2016 New Trends in Signal Processing (NTSP). Demanovska Dolina, 2016.
Farmer, Ben. "Head of MI6: Britain faces ‘fundamental threat to sovereignty from Russian meddling’." The Telegraph (2016).
Ploumis, Michail. "Hellenic National Security: The Turkish Challenge." The Army War College Review 2, no. 3 (2016): 21-42.
"High Representative Mogherini presents EU Global Strategy for Foreign and Security Policy." In EU Summit. Brussels, 2016.
Shafi, Kamran, and David Oliver. "Historical Operational Data Analysis for Defence Preparedness Planning." Journal of Defense Modeling & Simulation 15, no. 2 (2016).
Buriro, Attaullah, Bruno Crispo, Filippo Delfrari, and Konrad Wrona. Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication In Proceedings of the Mobile Security Technologies Workshop (MOST), in conjunction with 37th IEEE Symposium on Security and Privacy. San Jose, CA, 2016.
Homeland Security Exercise and Evaluation Program. FEMA (Official website of the Department of Homeland Security), 2016.
Kendall, Elisabeth. "How can al-Qaeda in the Arabian Peninsula be defeated?" Wash¬ington Post (2016).
Tarhan, Cigdem, Can Aydin, and Vahap Tecim. "How can disaster resilience be built with sustainable development." Procedia – Social and Behavioural Sciences 216 (2016): 452-459.
Langeland, Krista S., David Manheim, Gary W. McLeod, and George Nacouzi. How Civil Institutions Build Resilience: Organizational Practices Derived from Academic Literature and Case Studies . Santa Monica, CA: RAND Corporation, 2016.
Wieslander, Anna. "How NATO and the EU Can Cooperate to Increase Partner Resilience." In Forward Resilience: Protecting Society in an Interconnected World, 137-148. Washington: Center for Transatlantic Relations, 2016.
Porter, Geoff D.. "How realistic is Libya as an Islamic State “fallback”?" CTC Sentinel 9, no. 3 (2016): 1-5.
How Russian oligarchs turned the country of Latvia into their own personal money laundering machine. Gangsters Inc., 2016.

Pages