Biblio
Export 21463 results:
Agent-Based Intelligent Support to Coalition Operations." Information & Security: An International Journal 16 (2005): 41-61.
"Al-Qaeda's Operational Evolution: Behavioral and Organizational Perspectives In Mental Health Law & Policy Faculty Publications. University of South Florida, 2005.
Alternative Futures and Army Force Planning . Santa Monica, CA: RAND Arroyo Center, 2005.
Alternative Futures and Army Force Planning: Implications for the Future Force Era. Santa Monica, CA: RAND Corporation, Arroyo Center, 2005.
Analiza primene IMM algoritma za praćenje manevrišućih ciljeva." Vojnotehnički glasnik 3-4 (2005).
"Analysis and adaptation of NC3A and NATO member countries’ models for analysis, estimation, decision-making, planning and management in emergency situations and support to the computer assisted staff exercises at national and regional level (SEE and the In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2005.
Analysis of IMM algorithm for maneuvering target tracking." Vojnotehnički glasnik 53, no. 3-4 (2005).
"The Analysis of Protracted Social Conflict: A Tribute to Edward Azar." Review of International Studies 31, no. 1 (2005): 109-126.
"An Analysis of the Legal Framework Governing Prosecution of Traffickers and Victim Protection in Central Asian Countries." Connections: The Quarterly Journal 4, no. 4 (2005): 29-38.
"An Analytical Overview of Democratic Oversight and Governance of the Defence and Security Sector in Ukraine." In DCAF Working Papers., 2005.
"Analyzing Security Protocols with Secrecy Types and Logic Programs." Journal of the ACM 52, no. 1 (2005): 102-146.
"Annual Address to the Federal Assembly of the Russian Federation. Moscow: The Kremlin, 2005.
Applicability of the Additional Protocols to Computer Network Attack." In International Experts Conference on Computer Network Attack and the Applicability of International Humanitarian Law. Stockholm, 2005.
"Arabs in Romania, A Complete Radiography." Evenimentul Zilei (2005).
"Architecture for the integration of field and stationary information systems for emergency management In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2005.
Architectures in the Analysis of Requirements and Design of Simulation Systems." Information & Security: An International Journal 16 (2005): 104-114.
"Argument by Analogy." Argumentation 19, no. 1 (2005).
"Arms Expert Calls for START Verification Extension." Global Security Newswire (2005).
"The Art of Casual WiFi hacking., 2005.
The Art of Computer Virus Research and Defense . Addison Wesley Professional, 2005.
Arus Baru Islam Radikal; Transmisi Revivalisme Islam Timur Tengah ke Indonesia. Jakarta: Erlangga, 2005.