Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2013
Iztok, Prezelj
.
"
Smart Coun¬terterrorism: Incorporating the N-order Effects and Adopting a Human Security Perspective
(link is external)
."
The Polish Quarterly of International Affairs
22, no. 1 (2013).
Google Scholar
(link is external)
RTF
EndNote XML
Sevdalin, Stoykov
.
"
Smart Defense in the Information Age
."
per Concordiam, Journal of European Security and Defense Issues
4 (2013).
Google Scholar
(link is external)
RTF
EndNote XML
Minchev, Z.
, and
L. Boyanov
.
Smart Homes Cyberthreats Identification Based on Interactive Training
In
3rd International Conference on Application of Information and Communication Technology and Statistics in Economy an d Education (ICAICTSEE)
. Sofia, Bulgaria, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Jenkins, Simon
.
"
Snowden has started a global debate. Everywhere but here
."
Guardian
(2013): 35.
Google Scholar
(link is external)
RTF
EndNote XML
Omand, David
.
Snowden leaks 'worst ever loss to British intelligence'
(link is external)
. BBC News, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Latuhina, Kira
.
"
Sochi, palm-trees, pyramids
(link is external)
."
Rossiyskaya gazeta
(2013).
Google Scholar
(link is external)
RTF
EndNote XML
Fiske, Susan
, and
Shelley Taylor
.
Social cognition: From brains to Culture
. Thousand Oaks: Sage Publications , 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Raffie, Dina Al
.
"
Social Identity Theory for Investigating Islamic Extremism in the Diaspora
."
Journal of Strategic Security
6, no. 4 (2013): 67-91.
Google Scholar
(link is external)
RTF
EndNote XML
SOCTA 2013 EU Serious and Organised Crime Threat Assessment
(link is external)
. EUROPOL, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Deng, Chang Jian
,
Hong Yang Hu
, and
Jian Zhong Ling
.
"
Software Test of Wireless Vibration Nodes of Nuclear Power Plants
." In
Applied Mechanics and Materials
. Vol. 336-338., 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Soriwei, Fidelis
.
Soldiers Arrested for Aiding Boko Haram
(link is external)
. Punch, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Talts, Mait
.
"
Some Aspects of the Baltic Countries' Pre-and Post-Accession Convergence to the European Union
."
Baltic Journal of European Studies
3, no. 1 (2013).
Google Scholar
(link is external)
RTF
EndNote XML
Gearan, Anne
.
"
Sour U.S.-Russia Relations Threaten Obama’s Foreign Policy Agenda
."
Washington Post
(2013).
Google Scholar
(link is external)
RTF
EndNote XML
The South African Cyber Threat Barometer
. WolfPack, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
South East Europe 2020: Jobs and Prosperity in a European Perspective
. Regional Cooperation Council, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Arthur, Gordon
.
"
South Korean Defence Modernisation
(link is external)
."
Asian Military Review
(2013).
Google Scholar
(link is external)
RTF
EndNote XML
Hamm, Mark
.
The Spectacular Few: Prisoner Radicalization and the Evolving Terrorist Threat
. New York: New York University Press, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Lavrov, Sergey
.
Speech of and Answers to Questions of Mass Media by Russian Foreign Minister Sergey Lavrov Summarizing the Results of the Session of NATO-Russia Council at the Foreign Minister Level
(link is external)
. Brussels, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Wintour, Patrick
.
"
Spies to go under spotlight
."
Guardian
(2013): 1.
Google Scholar
(link is external)
RTF
EndNote XML
Hopkins, Nick
.
"
Spy agencies “need to show more leg” says ex-NSA chief
."
Guardian
(2013): 2.
Google Scholar
(link is external)
RTF
EndNote XML
SSS and security information breach
. Punch, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Fedorov, Yuriy
.
"
The State Armaments Program-2020: Power and Industry
(link is external)
."
Security Index
19, no. 4 (2013): 107.
Google Scholar
(link is external)
RTF
EndNote XML
Statement by UNHCR’s High Commissioner Mr. Antonio Gutierrez to the Security Council on April 18, 2013
(link is external)
In
Official records of the 6949th meeting of the UN Security Council
., 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Clapper, James R.
.
Statement for the Record. Worldwide Threat Assessment of the US Intelligence Community
. Office of the Director of National Intelligence, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Statement of the RF President V. Putin to the Federal Assembly
(link is external)
. Vol. 12 December 2013., 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
313
314
315
316
317
318
319
320
321
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top