Biblio
Export 21463 results:
Crisis in Ukraine – The Emergence of Hybrid Warfare." ISPSW Strategy Series (2015).
"A critical analysis of the role of the internet in the preparation and planning of acts of terrorism." Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide 4, no. 2 (2015): 121-133.
"Critical infrastructure protection – Romanian contributions and experiences (in Ukrainian)." In Zelena knyha z pytan zakhystu kritychoy infrastructuru, 93-106 . Kyiv: NISS, 2015.
" Critical Infrastructure Protection: the Challenges of Establishing Interagency Cooperation (in Ukrainian)." In Zelena knyha z pytan zakhystu kritychoy infrastructuru, 158-161. Kyiv: NISS, 2015.
"Croatia Moves Refugees to Hungarian Border – As It Happened." The Guardian (2015).
"Cross-Domain Coercion: The Current Russian Art of Strategy. Institute of International Relations, 2015.
Crude Oil Prices Down Sharply in Fourth Quarter of 2014. U.S. Energy Information Administration, 2015.
Crude Security: Oil, Armament, and Alliance. Vol. Ph.D. Political Science . The George Washington University, 2015.
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round." International Journal of Network Security 17, no. 6 (2015): 678-682.
"Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 7 (2015): 680-6.
"The CSDP without the UK: bad for Europe but even worse for Britain." In The Common Security and Defence Policy: National Perspectives. Brussels: The Royal Institute for International Relations, 2015.
"CSIRTs by Country - Interactive Map. ENISA, 2015.
The Cult of the Offensive: The Islamic State on Defense." CTC Sentinel 8, no. 4 (2015): 1-6.
"Customer Service Catalogue, Part I: Customer Handbook. NCI Agency, 2015.
Cyber criminal u Bosni i Hercegovini: Od iznuda i krađa bankovnih kartica do dječije pornografije., 2015.
Cyber Defense and Situational Awareness." In Advances in Information Security, 111. Vol. 62. Springer, 2015.
"Cyber Defense Capability Model: A Foundation Taxonomy In International Conference on Information Resources Management (CONF-IRM)., 2015.
Cyber Exercises Taxonomy., 2015.
Cyber Intelligence Decision Support in the Era of Big Data." In ESGI 113 Problems & Final Reports Book, 85-92. Sofia: Fastumprint, 2015.
"Cyber Security and Trust Tools for Multi-agency Cooperation between Public Authorities In Proceedings of the 7th International Conference on Knowledge Management and Information Sharing - KMIS., 2015.
Cyber Security Capacity Building in Developing Countries: Challenges and Opportunities In Report. Norwegian Institute for International Affairs-NUPI, 2015.
Cyber Security Competencies: Cyber Security Education and Research in Finnish Universities In 14th European Conference on Cyber Warfare & Security. Hatfield, UK: University of Hertfordshire, 2015.