The status of renewable energy in the GCC countries |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Agriculture, Consumption, Energy, Industry, Unmet Needs, Water |
2011 |
Renewable Energy Potentials in Saudi Arabia |
Activities, Problems, Technical Solutions, Social Solutions |
Consumption, Energy, Governance, Water |
---- |
A framework for providing lifelong finance to the owners of affordable dwellings in the Kingdom of Saudi Arabia |
Activities, Social Solutions |
Trade |
2011 |
Barriers hindering the utilisation of geothermal resources in Saudi Arabia |
Activities, Social Solutions |
Energy |
2009 |
Cultivation of Barley Under Harsh Environmental Conditions in Kuwait |
Activities, Problems, Social Solutions |
Agriculture |
2012 |
Kuwait’s agricultural efforts to mitigate climate change |
Activities, Problems, Social Solutions |
Agriculture |
2012 |
Social Network Analysis of Kuwait Publicly-Held Corporations |
Activities, Social Solutions |
Governance, Trade |
2012 |
Practice, awareness and opinion of pharmacists toward disposal of unwanted medications in Kuwait |
Activities, Technical Solutions, Social Solutions |
Population, Unmet Needs |
2012 |
Radioactivity of long lived gamma emitters in rice consumed in Kuwait |
Activities, Technical Solutions, Social Solutions |
Governance, Trade, Unmet Needs |
2012 |
Reasons for hospitalizations in adults with diabetes in Kuwait |
Activities, Social Solutions |
Governance, Population, Unmet Needs |
2010 |
Water availability for the greening of Kuwait |
Activities, Technical Solutions, Social Solutions |
Agriculture, Energy, Land Use, Governance, Industry, Water |
2002 |
Confidence-building and international agreement in cybersecurity |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Cyber Operations and the Jus Ad Bellum Revisited |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
The Council of Europe Convention on Cybercrime |
Activities, Social Solutions, International Responses |
Governance |
2013 |
Convention on Cybercrime: CETS No. 185 |
Activities, Social Solutions, International Responses |
Governance |
2013 |
Law and Borders: The Rise of Law in Cyberspace |
Activities, Social Solutions |
Governance |
2013 |
Technology and Internet Jurisdiction |
Activities, Social Solutions |
Governance |
2013 |
State and Trends of the Russian Digital Crime Market 2011 |
Activities |
Governance, Industry |
2013 |
The Federal Bureau of Investigation's Ability to Address the National Cyber Intrusion Threat |
Activities, Social Solutions |
Governance |
2013 |
National Cyber Incident Response Plan |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World |
Activities, Social Solutions |
Governance, Industry, Trade |
2013 |
Institutional Foundations for Cyber Security: Current Responses and New Challenges |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
Trustworthy Cyberspace: Strategic plan for the Federal cybersecurity research and development program |
Activities, Social Solutions |
Governance |
2013 |
Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise |
Activities, Social Solutions |
Governance |
2013 |
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions |
Activities, Social Solutions, International Responses |
Governance |
2013 |
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
The Smart Grid and Cybersecurity -- Regulatory Policy and Issues |
Activities, Technical Solutions, Social Solutions |
Energy, Governance, Industry |
2013 |
Changing the game: Key findings from The Global State of Information Security Survey 2013 |
Activities |
Governance, Industry, Trade |
2013 |
Cyber-Security: The vexed question of global rules, An independent report of cyber-preparedness around the world |
Activities |
Governance |
2013 |
Internet matters: The Net's sweeping impact on growth, jobs, and prosperity |
Activities, Social Solutions |
Governance, Trade |
2011 |
Posner's Remarks on Internet Freedom and Responsibility, October 2011 |
Activities, Social Solutions, International Responses |
Governance, Industry, Trade |
2013 |
Emerging Cyber Threats Report 2013 - Georgia Tech Institute Summit |
Activities, Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
Classification of Cyber Conflict |
Activities, International Responses |
Conflicts, Industry |
2012 |
The Fourth Quadrant |
Activities |
Governance |
2012 |
Power Hackers: The U.S. Smart Grid is Shaping Up to be Dangerously Insecure |
Activities |
Energy, Governance |
2012 |
The Problem Isn't Attribution; It's Multi-Stage Attacks |
Activities |
Conflicts, Governance |
2012 |
Optimal Error Correction for Computationally Bounded Noise |
Activities |
Industry |
2012 |
Creating the Demand Curve for Cybersecurity |
Activities, Social Solutions |
Governance |
2012 |
Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
Everything you need to know about Wikileaks |
Activities |
Governance |
2012 |
Regulators Can Help Obama Secure It |
Activities, Social Solutions |
Governance |
2012 |
Egypt Unrest: How do you shut down Internet service in an entire country? |
Activities, Social Solutions, International Responses |
Governance |
2012 |
Power and Information in Egypt - and Beyond |
Activities |
Governance |
2012 |
Untangling Attribution |
Activities, Technical Solutions |
Conflicts, Governance |
2012 |
China's Cyberassault on America |
Activities |
Governance |
2012 |
Protecting the Internet as a Public Commons |
Activities |
Industry |
2012 |
Dim Prospects for Cybersecurity Law in 2011 |
Activities, Social Solutions |
Governance |
2012 |
Semantic Distances for Technology Landscape Visualization |
Activities |
Governance |
2012 |