Daniel, Milan. "
Analysis of DSm belief conditioning rules and extension of their applicability." In
Advances and Applications of DSmT for Information Fusion (Collected works). Vol. III. Infinite Study, 2009.
Lopez, Javier, Rodrigo Roman, and Cristina Alcaraz. "
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks." In
Foundations of Security Analysis and Design V, 289-338. Vol. Lecture Notes in Computer Science, vol. 5705. Berlin, Heidelberg: Springer, 2009.
Joshi, Vanita, and Alok Bansal. "
Applicability of Artificial Neural Networks in Business." In
Information Technology Issues & Challenges. India: Excel Books, 2009.
Giragosian, Richard. "
Armenia at a Strategic Crossroads."
Connections: The Quarterly Journal 8, no. 3 (2009): 109-123.
Zukic, Anes. Assessing the Role of the Military in National Cybersecurity Efforts In
Faculty of the U.S. Army Command and General Staff College. Vol. Master of Military art and science. Ankara, Turkey: Land Forces Military Academy, 2009.
Turpe, Sven, Andreas Poller, Jan Steffan, Jan-Peter Stotz, and Jan Trukenmuller. Attacking the BitLocker Boot Process. Darmstadt, Germany: Fraunhofer Institute for Secure Information Technology (SIT), 2009.