Biblio

Export 21385 results:
2023
Mungur, S.. Using Political Legitimacy as a Lens to Understand How Misinformation Contributes to Political Polarization., 2023.
Timpanaro, Michael, and Victor Pidermann. "“The Want of Accurate Maps”: On Using Period Maps in Research for the Battle of Monmouth Courthouse." NJS: An Interdisciplinary Journal (2023).
Junior, David P. Succi. "What is blurred? Legitimizing domestic military operations in contemporary Brazil ." Critical Military Studies (2023).
Wiedemann, Madeline. When They Count: Civilian Casualty Tracking and Restraint in Partnered Military Operations-A Qualitative Analysis of Afghanistan In Department of Peace and Conflict Research. Vol. Master's Thesis. Uppsala University, 2023.
Reade, Michael C.. "Whose side are you on? Complexities arising from the non-combatant status of military medical personnel." Monash Bioethics Review (2023).
Lysychkina, Iryna, and Olha Lysychkina. Women, Peace, and Security Dimensions of the War in Ukraine In Connections: The Quarterly Journal. Vol. 22., 2023.
Ћупрић, Дамјан С.. Структурне Промене у Политици Проширења Европске Уније Према Државама Средње и Источне Европе In Факултет Политичких Наука. Vol. доктор. Београд: Универзитет у Београду, 2023.
2022
Ottuh, John Arierhi. "The 3Cs of Colonisation and their Impacts on African Slavery: The Nigeria’s Experience ." Black Theology: An International Journal 20, no. 1 (2022).
Shrivastava, Tanya, and Bharat Bhushan. "5 Blockchain-Based Cybersecurity Solutions for Industry 4.0 Applications." In Artificial Intelligence and Cybersecurity: Advances and Innovations, 69., 2022.
Jano, Dorian. "Albania Moving from Security Receiver to Security Provider." In Peace and Security in the Western Balkans: A Local Perspective. Taylor & Francis, 2022.
Bobkier, Robert, and Piotr Herman. "On the Ambiguity of the Concept of 'Narcoterrorism'." Rocznik Bezpieczeństwa Międzynarodowego (2022).
Herranen, Matias. Analysis of E-skills Found in Job Postings In Safety, Security and Risk Management. Vol. Bachelor of Business Administration. Laurea University of Applied Sciences , 2022.
Laksmi, Sylvia Windya. An Analysis of Government Capabilities in Countering Terrorist Financing in Indonesia. Vol. Doctor of Philosophy. Australian National University, 2022.
Dimitrov, Michael Minev. "Analysis of strategic stakeholders in the Western Balkans." Security and Defence Quarterly (2022).
Petrova, Valentina Markova. Analytical hierarchical process for assessment and selection of secure software solutions. Varna, Bulgaria: Nikola Vaptsarov Naval Academy , 2022.
Ostrovsky, Aaron. Applying Defense-In-Depth to Defend Against Russian State-Sponsored Disinformation Campaigns. Vol. Master of Science in Cybersecurity. Utica University, 2022.
Yaman, Fuat. Applying Machiavellian Discourses to Russian Hybrid Warfare In Graduate School of Social Sciences. Vol. Master of Arts. Middle East Technical University, 2022.
Iliev, Iliyan, and Ivan Blagoev. "An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage." Information & Security: An International Journal 53, no. 1 (2022): 78-88 .
Mygal, Valeriy, Galyna Mygal, and Stanislav Mygal. "Artificial intelligence as the cognitive value of heuristic models." Radioelectronic and Computer Systems 2 (2022).
Jażdżewska-Gutta, Magdalena, and Przemysław Borkowski. "As strong as the weakest link. Transport and supply chain security." Transport Reviews (2022).
Qiao, Dalei, Guangzhong Liu, Wei Li, Taizhi Lyu, and Juan Zhang. "Automated Full Scene Parsing for Marine ASVs Using Monocular Vision." Journal of Intelligent & Robotic Systems volume 104 (2022).
Georgiev, Venelin. The ‘Balance’ As a Panacea for Achieving (Cyber)Security In IT4Sec Reports., 2022.
Shay, Shaul. "Between Kiev and Venice - The Cognitive Warfare and the Biennale of Venice." Security Science Journal 2 (2022).
Alkan, Erkan. Birleşik Krallığın dış politikasında yumuşak güç aracı olarak burs programları. Vol. masterThesis. Batman: Batman Üniversitesi Lisansüstü Eğitim Enstitüsü, 2022.
Kaushik, Keshav. "Blockchain Enabled Artificial Intelligence for Cybersecurity Systems." In Big Data Analytics and Computational Intelligence for Cybersecurity, 165-179. Cham: Springer, 2022.

Pages