Biblio
Export 21463 results:
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations In Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)., 2013.
Analysis of Perceptions of Conventional and E-Learning Education in Corporate Training." Journal of Competitiveness 5, no. 4 (2013).
"Analysis of Virtualization Systems in Cloud Architecture Design In MT&S-2013,. Sofia, Bulgaria: Defence Institute, 2013.
Analytical support to foresighting EU roles as a Global Security Actor." Information & Security: An International Journal 29, no. 1 (2013): 21-33.
"Anarchy and Hegemony. Stratfor, 2013.
Annual Report 2013 on Radiation and Nuclear Safety in the Republic of Slovenia, Ministry of agriculture and the environment. Slovenian nuclear safety administration, 2013.
Annual Report on the Protection of the Constitution. Summary. Federal Ministry of the Interior, 2013.
Annual Research Review: What is Resilience within the Social Ecology of Human Development?" Journal of Child Psychology and Psychiatry 54, no. 4 (2013): 348-366.
"Anonymity Query Method of Outsourced Database." Advanced Materials Research 798-799 (2013): 837-841.
"Ansar Jerusalem Announces Deaths of 3 Fighters, Including Commander. Threat Matrix, 2013.
The Applicability of International Law in Cyberspace-From If to How?. Panel Three at the Georgetown University Conference on the International Law on Cyber, 2013.
Application of DSmT-ICM with Adaptive decision rule to supervised classification in multisource remote sensing." Journal of Computing 5, no. 1 (2013).
"Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. Waltham, MA: Syngress, 2013.
"Apply International Law to Cyber-Warfare? Good Luck." The Economist (2013).
Approach to Build a Break-out Scenario for Solving Task on Supporting Decision-making Assessment of Real Estate." Upravlinnia rozvytkom skladnykh system 16 (2013): 86-95.
"Aproposed Framework for Information Fusion and Obtain Beliefs from Evidences." Egyptian Computer Science Journal 37 , no. 1 (2013).
"Arab Spring: A Research and Study Guide. Cornell University Library Guide, 2013.
Arab Spring: Expectations and Reality. Vol. 4 October 2013. Russian Foreign Affairs Council, 2013.
The Arab Spring – fog and fear. Vol. 1 May 2013. Global Affairs, 2013.
Armed Forces, Kyrgyzstan. London: IHS Global Limited, 2013.
The Armed Forces of Kyrgyzstan: Brief Overview and Perspectives for Development at the Current Stage." In Almanac 2012: Governing and Reforming Kyrgyzstan Security Sector, 26. Geneva-Bishkek: Geneva Centre of the Democratic Control of the Armed Forces, 2013.
"Armed Groups in the Sinai Peninsula. Enschede: Civil Military Fusion Centre, 2013.
The Armed Incident in Georgia’s Lopota Valley and its Implications for the Security Situation of the South Caucasus." Connections: The Quarterly Journal 12, no. 3 (2013): 118-126.
"Armenia’s Economic Dependence on Russia Insurmountable by the European Union." Eurasia Daily Monitor 10, no. 221 (2013).
"