Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2011
Pennacchiotti, Marco
, and
Ana-Maria Popescu
.
Democrats, republicans and Starbucks afficionados: user classification in Twitter
In
17th ACM SIGKDD international conference on Knowledge discovery and data mining
., 2011.
Google Scholar
RTF
EndNote XML
Chung, Kil Woo
,
Alexander Sutin
,
Alexander Sedunov
, and
Michael Bruno
.
"
DEMON Acoustic Ship Signature Measurements in an Urban Harbor
."
Advances in Acoustics and Vibration
(2011): article 952798.
DOI
Google Scholar
RTF
EndNote XML
Perthes, Volker
.
Der Aufstand – Die arabische Revolution und ihre Folgen
. Munich: Random House, 2011.
Google Scholar
RTF
EndNote XML
Prokhorova, Yuliya
,
Linas Laibinis
,
Elena Troubitsyna
,
Kimmo Varpaaniemi
, and
Timo Latvala
.
Derivation and Formal Verification of a Mode Logic for Layered Control Systems
In
Proceedings of the 18th Asia-Pacific Software Engineering Conference, APSEC 2011
. IEEE, 2011.
DOI
Google Scholar
RTF
EndNote XML
"
Des troupes saoudiennes à Bahrein, les chiites parlent de guerre
."
L’Express
(2011).
Google Scholar
RTF
EndNote XML
Niemiec, Marcin
.
Design, Construction and Verification of a High-Level Security Protocol Allowing to Apply the Quantum Cryptography in Communication Networks
. Vol. Ph.D. Thesis. AGH University of Science and Technology, 2011.
Google Scholar
RTF
EndNote XML
Liedtka, Jeanne M.
, and
Tim Ogilvie
.
Designing for Growth: A design thinking tool kit for managers
. New York: Columbia University Press, 2011.
Google Scholar
RTF
EndNote XML
Zeneli, Valbona
.
The Determinants for the Attraction of FDI in Southeast European Countries: The Role of Institutions
In
University of Bari
. Vol. Ph.D. dissertation., 2011.
Google Scholar
RTF
EndNote XML
McDevitt, Michael
.
Deterring North Korean Provocations
. Brookings East Asia Commentary, 2011.
Google Scholar
RTF
EndNote XML
Development of a Strategic Roadmap Towards a Large Scale Demonstration Project in European Logistics and Supply Chain Security
. LOGSEC Deliverable, 2011.
Google Scholar
RTF
EndNote XML
Telatin, Michela
.
The Development-Security Nexus and Security Sector Reform
. Vol. Ph.D. diss. University of Westminster, 2011.
Google Scholar
RTF
EndNote XML
Dictionary of Military and Associated Terms
In
Joint Publication
. Vol. 1-02. Washington, D.C.: United States Department of Defense, Government Printing Office, 2011.
Google Scholar
RTF
EndNote XML
Casey, Eoghan
.
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet
. Boston, MA: Academic Press, 2011.
Google Scholar
RTF
EndNote XML
Prodanov, Hristo
.
Digital Politics
. Sоfia, 2011.
Google Scholar
RTF
EndNote XML
Yakışır, Benay
.
Din-dış politika etkileşimi ve bu etkileşimin AB entegrasyon politikalarına yansıması
. Vol. Yüksek Lisans Tezi. Ankara: Başkent Üniversitesi, 2011.
Google Scholar
RTF
EndNote XML
Asada, Matthew
,
Susan Johnson
, and
Cameron Munter
.
Diplomacy Post-9/11: Life in the US Foreign Service
In
interview by Kojo Nnamdi, The Kojo Nnamdi Show
., 2011.
Google Scholar
RTF
EndNote XML
Fischer, Elisabeth
.
Disaster Response: The Role of a Humanitarian Military
. Army-technology.com, 2011.
Google Scholar
RTF
EndNote XML
Disaster Risk Reduction Capacity Assessment Report for Albania
. UNDP, 2011.
Google Scholar
RTF
EndNote XML
Cizre, Umit
.
"
Disentangling the Threads of Civil-Military Relations in Turkey: Promises and Perils
."
Mediterranean Quarterly
22, no. 2 (2011): 57-75.
Google Scholar
RTF
EndNote XML
Clifton, Joseph K.
.
Disputed Theory and Security Policy: Responding to the ‘Rise of China’
. Claremont: McKenna College, 2011.
Google Scholar
RTF
EndNote XML
Senapathi, R.
.
"
Dissemination and Utilisation: Knowledge
."
SCMS Journal of Indian Management
8, no. 2 (2011): 85-105.
Google Scholar
RTF
EndNote XML
Distance Education Fraud Rings
. Washington, D.C.: Department of Education, 2011.
Google Scholar
RTF
EndNote XML
Schulz, Manuel
, and
Andrea Neusius
.
"
Distance Learning in the Bundeswehr: Skills Are More Than Knowledge
."
Connections: The Quarterly Journal
10, no. 4 (2011): 95-102.
DOI
Google Scholar
RTF
EndNote XML
NIKOLOV, Orlin
.
"
Distributed Training, CAX and Experimentation in support of Crisis Management
."
Information & Security: An International Journal
27, no. 2 (2011): 138-146.
DOI
Google Scholar
RTF
EndNote XML
Willems, Christian
,
Thomas Klingbeil
,
Lukas Radvilavicius
,
Antanas Cenys
, and
Christoph Meinel
.
A Distributed Virtual Laboratory Architecture for Cybersecurity Training
. ICITST, 2011.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
375
376
377
378
379
380
381
382
383
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance