Biblio
Export 21424 results:
Hangi Öğeler Ulusal Güvenlik Strateji Belgelerini Oluşturmalıdır? Bir İçerik Analizi." Science Journal of Turkish Military Academy Haziran 26, no. 1 (2016): 23-49.
"Hash Function Generation by Neural Network." In 2016 New Trends in Signal Processing (NTSP). Demanovska Dolina, 2016.
"Head of MI6: Britain faces ‘fundamental threat to sovereignty from Russian meddling’." The Telegraph (2016).
"Hellenic National Security: The Turkish Challenge." The Army War College Review 2, no. 3 (2016): 21-42.
""High Representative Mogherini presents EU Global Strategy for Foreign and Security Policy." In EU Summit. Brussels, 2016.
Historical Operational Data Analysis for Defence Preparedness Planning." Journal of Defense Modeling & Simulation 15, no. 2 (2016).
"Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication In Proceedings of the Mobile Security Technologies Workshop (MOST), in conjunction with 37th IEEE Symposium on Security and Privacy. San Jose, CA, 2016.
Homeland Security Exercise and Evaluation Program. FEMA (Official website of the Department of Homeland Security), 2016.
How can al-Qaeda in the Arabian Peninsula be defeated?" Wash¬ington Post (2016).
"How can disaster resilience be built with sustainable development." Procedia – Social and Behavioural Sciences 216 (2016): 452-459.
"How Civil Institutions Build Resilience: Organizational Practices Derived from Academic Literature and Case Studies . Santa Monica, CA: RAND Corporation, 2016.
How NATO and the EU Can Cooperate to Increase Partner Resilience." In Forward Resilience: Protecting Society in an Interconnected World, 137-148. Washington: Center for Transatlantic Relations, 2016.
"How realistic is Libya as an Islamic State “fallback”?" CTC Sentinel 9, no. 3 (2016): 1-5.
"How Russian oligarchs turned the country of Latvia into their own personal money laundering machine. Gangsters Inc., 2016.
How to Search the Internet of Things for Photos of Sleeping Babies. ArsTechnica, 2016.
Human Security, United Nations Security Council Resolution 1325, and Vulnerable People: Rhetoric, Solidarity, and Silences in International Human Rights Discourses on Syrian Women Refugees In Faculty of the College of Literature, Science, & Arts. Vol. Bachelor of Science. University of Michigan, 2016.
Hybrid pedagogies for hybrid war In Proceedings of Scientific Research and Education in the Air Force, AFASES 2016. Vol. 18., 2016.
Is the Hybrid Threat a True Threat?" Journal of Strategic Security 9, no. 2 (2016): 6.
"Hybrid Warfare: A Known Unknown?. Foreign Policy Association, 2016.
Is hybrid Warfare a New Manner of Conducting Warfare." Review of the Air Force Academy 14, no. 2 (2016): 155-160.
"Hybrid Warfare and the Changing Character of Conflict." Connections: The Quarterly Journal 15, no. 2 (2016): 65-72.
"Hybrid Warfare: From “War During Peace” to “Neo-Imperialist Ambitions”. The Case of Russia." Modelling the New Europe. An On-line Journal, no. 21 (2016): 97-128.
"Ideas, Beliefs, Strategic Culture, and Foreign Policy: Understanding Brazil's Geopolitical Thought. University of Central Florida, 2016.
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk." Elsevier, Computers & Security 57 (2016): 31-46.
"Identity Gerrymandering: How the Armenian State Constructs and Controls “Its” Diaspora In Department of Political Science. Vol. degree of Doctor of Philosophy. Toronto: University of Toronto, 2016.