Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2010
Analysis of Law in the EU and a Selection of Member States pertaining to Cross-Border Disaster Relief. Synthesis Report and Recommendations
. International Federation of Red Cross and Red Crescent Societies, 2010.
Google Scholar
RTF
EndNote XML
Analysis of Law in the EU Pertaining to Cross-Border Disaster Relief (EU IDRL Study)
. German Red Cross, 2010.
Google Scholar
RTF
EndNote XML
Campbell, Alan
.
Analytic Implications of the NATO Defence Planning Process
In
Specialist Team Summary Report
. NATO, 2010.
Google Scholar
RTF
EndNote XML
Lopez-Nicolas, Carolina
, and
Pedro Soto-Acosta
.
"
Analyzing ICT adoption and use effects on knowledge creation: An empirical investigation in SMEs: SSIS
."
International Journal of Information Management
30, no. 6 (2010): 521.
Google Scholar
RTF
EndNote XML
Gonsalves, Antone
.
"
Android Phones Steal Market Share
."
InformationWeek
(2010).
Google Scholar
RTF
EndNote XML
Announced by Assistant Minister Nedeljkovic, Head of Ministry’s ICT Sector at the Public Hearing on Cyber Security in Serbian Parliament held
., 2010.
Google Scholar
RTF
EndNote XML
Annual Report 2009
. Internal Security Agency, 2010.
Google Scholar
RTF
EndNote XML
Brunner, Martin
,
Hans Hofinger
,
Christopher Roblee
,
Peter Schoo
, and
Sascha Todt
.
"
Anonymity and Privacy in Distributed Early Warning Systems
." In
CRITIS 2010: Critical Information Infrastructures Security
., 2010.
Google Scholar
RTF
EndNote XML
O'Connor, Brendon
, and
Srdjan Vucetic
.
"
Another Mars–Venus divide? Why Australia said ‘yes’ and Canada said ‘non’ to involvement in the 2003 Iraq War
."
Australian Journal of International Affairs, Volume 64, 2010 - Issue 5
64, no. 5 (2010): 526-548.
Google Scholar
RTF
EndNote XML
Bitter, Christian
,
David A. Elizondo
, and
Tim Watson
.
"
Application of Artificial Neural Networks and Related Techniques to Intrusion Detection
." In
The 2010 International Joint Conference on Neural Networks (IJCNN)
., 2010.
DOI
Google Scholar
RTF
EndNote XML
Procházková, Dana
.
Application of SWOT Analysis and of Selected Types of Case Studies at Selection of Model for Strategic Territory Safety Management
., 2010.
Google Scholar
RTF
EndNote XML
Giacobe, Nicklaus A.
.
Application of the JDL Data Fusion Process Model for Cyber Security
In
Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications
. Vol. 7710. SPIE, 2010.
DOI
Google Scholar
RTF
EndNote XML
Ikenson, Daniel
.
Appreciate This: Chinese Currency Rise Will Have a Negligible Effect on the Trade Deficit
. Washington, D.C.: CATO Institute, 2010.
Google Scholar
RTF
EndNote XML
On the approval of the Updated Individual Partnership Action Plan the Republic of Moldova – NATO
In
Government Decision of the Republic of Moldova
., 2010.
Google Scholar
RTF
EndNote XML
Johnson, Gregory D.
.
"
AQAP in Yemen and the Christmas Day Terrorist Attacks
."
CTC Sentinel
Special Issue (2010): 1-4.
Google Scholar
RTF
EndNote XML
Coates, Kenneth
,
Whitney Lackenbauer
,
William Morrison
, and
Greg Poelzer
.
Arctic Front: Defending Canada in the Far North
. Toronto: Thomas Allen , 2010.
Google Scholar
RTF
EndNote XML
Bloomfield, Lincoln P.
.
"
The Arctic: Last Unmanaged Frontier
."
Foreign Affairs
60, no. 1 (2010).
Google Scholar
RTF
EndNote XML
Zajas, Stanisław
.
"
The Armed Forces’ Development at the Beginning of the Twenty-First Century from the Polish Perspective
."
Connections: The Quarterly Journal
9, no. 4 (2010): 97-105.
DOI
Google Scholar
RTF
EndNote XML
Nichol, Jim
.
Armenia, Azerbaijan, and Georgia: Security Issues and Implications for U.S. Interests
In
CRS Report for Congress
. Washington, D.C.: Congressional Research Service, 2010.
Google Scholar
RTF
EndNote XML
Mirzoyan, Alla
.
Armenia, the Regional Powers, and the West: Between History and Geopolitics
. Palgrave Macmillan, 2010.
Google Scholar
RTF
EndNote XML
Tsakiris, George
,
Harris Vangelis
, and
Dimitris Tigkas
.
"
Assessing Water System Vulnerability to Drought to Multi-year Droughts
."
European Water 29
29 (2010): 21-29.
Google Scholar
RTF
EndNote XML
Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses
. Idaho Falls, ID: Idaho National Laboratory, 2010.
Google Scholar
RTF
EndNote XML
Deriglazova, Larisa
.
"
Asymmetric character of contemporary conflicts
."
Geopolitics Magazine
(2010).
Google Scholar
RTF
EndNote XML
Markoff, John
.
"
At Internet Conference, Signs of Agreement Appear Between U.S. and Russia
."
The New York Times
(2010).
Google Scholar
RTF
EndNote XML
Judah, Tim
.
"
At Last, Good News from the Balkans
."
New York Review of Books
(2010).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
407
408
409
410
411
412
413
414
415
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance