Biblio
Export 21470 results:
Formal Goal-Oriented Development of Resilient MAS in Event-B In Proceedings of 17th International Conference on Reliable Software Technologies. Berlin, Heidelberg: Springer-Verlag, 2012.
A Formal Model of Cryptographic Systems for Protection of Information in Computer Systems and Networks In Bulgarian Cryptography Days – BulCrypt 2012. Sofia, Bulgaria, 2012.
Formal Modelling and Verification of Service-Oriented Systems in Probabilistic Event-B In Proceedings of the International Conference on Integrated Formal Methods, IFM 2012., 2012.
On the Formal Properties of Morphological Models." Acta Morphologica Generalis 1, no. 2 (2012): 21-35.
"Formal Verification of Nuclear Systems: Past, Present, and Future." Information & Security: An International Journal 28, no. 2 (2012): 223-235.
"Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants." Information & Security: An International Journal 28, no. 1 (2012): 65-78.
"The formation of an Eurasian geopolitical context." Kazakhstan in global processes 2 (2012): 34-44, 39.
"Former U.S. State Dep’t Official Pifer Asks, ‘Are the Russians Ready to Reengage?’. Radio Free Europe/Radio Liberty, 2012.
Foundations of Network Organizations Ontology." International Journal of Business and Management Studies 1, no. 1 (2012): 565-569.
"A Framework for Securing e-Government Services: The Case of Tanzania In Computer and Systems Sciences. Vol. Doctor. Sweden: Stockholm University, 2012.
A Framework for Semantic Map Construction." International Journal of Computer Science Issues (IJCSI) 9, no. 5 (2012): 206-215.
"Frankfurt airport gunman jailed for life. BBC News online, 2012.
From Contradiction to Cooperation: A New Legal and Diplomatic Foundation for Energy Policy in the EU." Journal of Energy Security (2012).
"From Offensive Realism to Defensive Realism: A Social Evolutionary Interpretation of China’s Security Strategy. Nanyang Technical University, Singapore, 2012.
From Risk Society to Network Society: Preventing Cybercrimes in the 21st Century." Journal of Applied Security Research 7, no. 1 (2012).
"From the Chairman: Making Strategy Work." Joint Forces Quarterly 66 (2012): 2-3.
"From Transition to Opportunity: Security through Economic Development & Institutional Strengthening." Research in the World Economy 3, no. 2 (2012).
"Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges In Proceedings of 2012 10th International Conference on Frontiers of Information Technology (FIT). Institute of Electrical and Electronics Engineers, 2012.
Future of Europe Group plans closer EU integration In BBC News Europe., 2012.
The Future of Europe. Towards a Two-speed Europe?. Cambridge: Cambridge University Press, 2012.
G.A. Zyuganov: China is taking long strides and looking far ahead. Vol. 7 November 2012. Official website of the Communist Party of the Russian Federation, 2012.
GAO Report on Higher Education: Use of New Data Could Help Improve Oversight of Distance Education." Connections: The Quarterly Journal 12, no. 1 (2012): 65-101.
"Gap-and-IMECA-based Assessment of I&C Systems Cyber Security." In Advances in Intelligent and Soft Computing, 149-164. Berlin Heidelberg: Springer, 2012.
"Gaze tutor: Agaze-reactive intelligent tutoring system." International Journal of Human-Computer Studies 70 (2012): 377-398.
"