Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2011
Tsvetkov, Kiril
.
Pod syankata na promenite i pagona
. Sofia: Media Nikolova, 2011.
Google Scholar
RTF
EndNote XML
Peres, Julio F. P.
,
Bernd Foerster
,
Leandro G. Santana
,
Mauricio Domingues Fereira
,
Antonia G. Nasello
,
Mariângela Savoia
,
Alexander Moreira-Almeida
, and
Henrique Lederman
.
"
Police Officers Under Attack: Resilience Implications of an fMRI Study
."
Journal of Psychiatric Research
45, no. 6 (2011): 727-734.
Google Scholar
RTF
EndNote XML
Porto Sicuro 2011 and Virgilio 2011
., 2011.
Google Scholar
RTF
EndNote XML
Hintsa, Juha
.
Post-2001 Supply Chain Security – Impacts on the Private Sector
. Lausanne, Switzerland: Université de Lausanne, 2011.
Google Scholar
RTF
EndNote XML
Potential for Peace and Threats of Conflict: Development Analysis of Cross-border Communities in Isfara District of the Republic of Tajikistan and Batken District of the Kyrgyz Republic
. Jamoat Resource Center of Vorukh, 2011.
Google Scholar
RTF
EndNote XML
Gross, Philip N.
.
"
Potential software nightmare for International Space Station
."
The Risks Digest 19:49
(2011).
Google Scholar
RTF
EndNote XML
Cristian, Amancei
.
"
Practical Methods for Information Security Risk Management
."
Informatica economica
15, no. 1 (2011): 151-159.
Google Scholar
RTF
EndNote XML
Kalech, Meir
,
Sarit Kraus
,
Gal A. Kaminka
, and
Claudia V. Goldman
.
"
Practical voting rules with partial information
."
Autonomous Agents and Multi-Agent Systems
22, no. 1 (2011): 151-182 .
Google Scholar
RTF
EndNote XML
Scheunert, Ullrich
,
Heiko Cramer
, and
Gerd Wanielik
.
"
Precise Vehicle Localization Using Multiple Sensors and Natural Landmarks
.", 2011.
Google Scholar
RTF
EndNote XML
Delaney, Greg
.
"
President Nazarbayev – Address to the Nation 2011 (highlights)
."
Kazakh-stanLive.com
(2011).
Google Scholar
RTF
EndNote XML
Hanson, Victor Davis
.
The President’s Chosen Weapon
. Philadelphia Inquirer , 2011.
Google Scholar
RTF
EndNote XML
U.S. Department of Health and Human Services
.
Press Statement on the NSABB Review of H5N1 Research
. NIH News, 2011.
Google Scholar
RTF
EndNote XML
Government, HM
.
Prevent Strategy
. London: The Stationery Office, 2011.
Google Scholar
RTF
EndNote XML
Cavoukian, Ann
.
Privacy by Design: The 7 Foundational Principles
. Ontario : Information and Pri¬vacy Commissioner of Ontario , 2011.
Google Scholar
RTF
EndNote XML
Wohlgemuth, Sven
,
Isao Echizen
, and
Noboru Sonehara
.
"
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking
."
Journal of Information Hiding and Multimedia Signal Processing
2, no. 3 (2011).
Google Scholar
RTF
EndNote XML
"
Privatising Peace
."
The Economist
(2011).
Google Scholar
RTF
EndNote XML
Lazić, Ana Jović
,
Sanja Jelisavac Trošić
, and
Aleksandar Jazić
.
"
Problem Nagorno Karabah u Svetlu Bilateralnih Odnosa Članica Minsk Grupe Oebs-A
."
Medjunarodni problemi
LXIII, no. 4 (2011): 583-612.
Google Scholar
RTF
EndNote XML
Alghamdi, Abdullah Sharaf
,
Tazar Hussain
,
Gul Faraz Khan
,
Khalid Alnafjan
, and
Abdul Haseeb
.
"
Proposed methodology to enhance C4I systems security on architectural level
."
Scientific Research and Essays
6, no. 29 (2011): 6095-6103.
Google Scholar
RTF
EndNote XML
Baev, Pavel
.
"
The Prospect of Putin’s Return Comes into Focus
."
Jamestown Foundation Eurasia Daily Monitor
8, no. 147 (2011).
Google Scholar
RTF
EndNote XML
Klymenko, Iryna
.
The Prospects for Relations between Ukraine and the Customs Union of the Republic of Belarus, the Republic of Kazakhstan and the Russian Federation
. Kyiv: National Institute for Strategic Studies, 2011.
Google Scholar
RTF
EndNote XML
"
Pundits Downplay Terror Threats Over Kazakh Plans To Help ISAF In Afghanistan
."
Interfax-Kazakhstan
(2011).
Google Scholar
RTF
EndNote XML
Horvath, Robert
.
"
Putin's ‘Preventive Counter-Revolution’: Post-Soviet Authoritarianism and the Spectre of Velvet Revolution
."
Europe-Asia Studies
63, no. 1 (2011): 1-25.
Google Scholar
RTF
EndNote XML
Niemiec, Marcin
,
Łukasz Romański
, and
Marcin Święty
.
"
Quantum cryptography protocol simulator
."
Communications in Computer and Information Science, Multimedia communications, services and security
149 (2011): 286-292.
Google Scholar
RTF
EndNote XML
Minasyan, Sergey
.
"
The Quest for Stability in the Karabakh Conflict: Conventional Deterrence and Political Containment
."
PONARS Eurasia Policy Memo No. 188
(2011).
Google Scholar
RTF
EndNote XML
King, Michael
, and
Donald M. Taylor
.
"
The Radicalization of Homegrown Jihadists: A Review of Theoretical Models and Social Psychological Evidence
."
Terrorism and Political Violence
23, no. 4 (2011): 609.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
393
394
395
396
397
398
399
400
401
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance