Biblio

Export 21359 results:
0
UNDP. Arab Human Development Reports .
Podtserod, A.B.. Arab Spring or Islamist Autumn?. Instute Blijnevo Vostoka.
Storey, Ian. "Asia’s Changing Balance of Military Power: Implications for the South China Sea Dispute." In Maritime Energy Resources in Asia: Energy and Geopolitics. Seattle, WA: National Bureau of Asian Research.
B., Adida. BeamAuth: Two-Factor Web Authentication With a Bookmark In Proc. of 14th ACM Conference on Computer and Communications Security. Alexandria, USA.
"Bidzina Ivanishvili’s Address to Politicians, Media and the Public." News Georgia.
Bilateral relations: The former Yugoslav Republic of Macedonia. European Commission.
Healey, Jason. Breakthrough or Just Broken? China and Russia’s UNGA Proposal on Cyber Norms. New Atlanticist.
Shalamanov, Velizar. "Civil Security and Crisis Management: The Concept Development and Experimentation Process in Bulgaria (Role of the US, NATO and the EU in SEE)." In The fight against terrorism and crisis management in the Western Balkans, 147-164 . IOS Press.
I. Allen, Elaine, and Jeff Seaman. Class Differences: Online Education in the United States, 2010. Wellesley, MA: Babson Survey Research Group and the Sloan Consortium.
Lakshika, E., M. Barlow, and A. Easton. "Co-evolving semi-competitive interactions of sheepdog herding behaviors utilizing a simple rule-based multi agent framework." In Artificial Life (ALIFE), 2013 IEEE Symposium on. Singapore: IEEE.
Cui, Yanliang, and Dechang Pi. "A combat complex system based on artificial life." In System Simulation and Scientific Computing, 2008. ICSC 2008. Asia Simulation Conference - 7th International Conference on. Beijing: IEEE.
Nouredine, Gasmallah, and Seridi Hassina. "Composition of web service based multi-agent." In International Conference on Multimedia Computing and Systems. Ouarzazate, Morocco .
Leheny, David. "Constructivism and International Relations in Asia." In The Oxford Handbook of the International Relations of Asia. Oxford University Press.
University, Johns Hopkins. Corona Virus Map.
"Coronavirus Disease (COVID-2019) Situation Reports." WHO.
I., Kershner. "Cyber attack exposes 20,000 Israeli credit card numbers and details about users." New York Times.
Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare." In White paper pre¬sented at the 2008 Black Hat Conference, 7.0.
Dai 189 Kai Kokkai Kaigiroku Sangiin Naikaku Iinkai & Zaisei Kinyu Iinkai Rengou Shinsa Dai 1 Gou [The Diet Record in the 189th session of the Diet, House of Councillors, the Cabinet Office & the Financial Committee Vol.1]. House of Councilors in the National Diet of Japan.
Kim, Cheonshik. "Data Hiding Based on BTC using EMD ." The Journal of The Institute of Internet, Broadcasting and Communication 14, no. 2: 11-16 .
Deal Signed on Extending Russian Military Presence in Armenia. Radio Free Europe – Radio Liberty.
Definition of Aggression, United Nations General Assembly.
Roman, Alexandru V.. "Delineating Three Dimensions of E-Government Success: Security, Functionality, and Transformation." In E-Government Success Factors and Measures: Theories, Concepts, and Methodologies.
Ra, Kim Mi. "Desires of Residential Mobility and the Related Variables among the Rental Apartment Residents (임대아파트 거주자의 주거이동 희망 여부와 관련 변인 )." Journal of Korean Home Management Association 21, no. 4: 11-21.
Nye, Jr., Joseph S.. "Deterrence and Dissuasion in Cyberspace." International Security 41, no. 3: 44-71.
Mateeva, Gergana, Dimitar Parvanov, and Todor Balabanov. "Differential Evolution and Particle Swarm Optimization Efficiency According to Pseudo-Random Number Generator Quality." Problems of Engineering Cybernetics and Robotics 76: 39-46.

Pages