Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
0
Huda, Solichul
,
Tohari Ahmad
,
Riyanarto Sarno
, and
Heru Agus Santoso
.
"
Identification of process-based fraud patterns in credit application
." In
2nd International Conference on Information and Communication Technology (ICoICT)
.
Google Scholar
(link is external)
RTF
EndNote XML
Chertoff, Michael
, and
Tobby Simon
.
The Impact of the Dark Web on Internet Governance and Cyber Security
(link is external)
In
GCIG Paper Series no. 6
. Global Commission on Internet Governance and Chatham House.
Google Scholar
(link is external)
RTF
EndNote XML
Zayed, Khaled
.
"
Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device
."
Int. J. Teaching and Case Studies
7, no. 3/4.
Google Scholar
(link is external)
RTF
EndNote XML
Bradley, M.
, and
P. Lang
.
The International Affective Digitized Sounds: Affective Ratings of Sounds and Instruction Manual
In
IADS-2
. NIMH Center for the Study of Emotion and Attention.
Google Scholar
(link is external)
RTF
EndNote XML
International CEP Handbook 2009 - Civil Emergency Planning in the NATO/EAPC Countries
. Swedish Civil Contingencies Agency (MSB).
Google Scholar
(link is external)
RTF
EndNote XML
Abazi, Enika
, and
Albert Doja
.
"
International Representations of Balkan Wars: A Socio-Anthropological Approach in International Relations Perspective,
."
Cambridge Review of International Affairs
29, no. 2.
Google Scholar
(link is external)
RTF
EndNote XML
Neumann, Peter R.
.
"
Kapitel 13 Innere Sicherheit in Großbritannien. Die Reaktionen auf den Juni 2007
."
Jahrbuch Terrorismus
2.
Google Scholar
(link is external)
RTF
EndNote XML
Aliyev, Kenan
.
Karimov Maintains Low Prole During U.S. Visit
(link is external)
. Eurasianet.
Google Scholar
(link is external)
RTF
EndNote XML
Andriuškevičius, Arūnas
.
Kauno diena
(link is external)
.
Google Scholar
(link is external)
RTF
EndNote XML
Tindemans, Leo
.
L’Union Européenne. Rapport de M.Leo Tindemans au Conseil Européen
(link is external)
In
Bulletin des Communautés Européennes, Supplément
. Commission des Communautés Européennes.
Google Scholar
(link is external)
RTF
EndNote XML
Weick, Karl E.
, and
Kathleen M. Sutcliffe
.
Managing the Unexpected, Resilient Performance in an Age of Uncertainty
. Princeton: Princeton University Press.
Google Scholar
(link is external)
RTF
EndNote XML
Manifesto of the Pan-Russian National Front
(link is external)
.
Google Scholar
(link is external)
RTF
EndNote XML
Velev, Grigor
, and
Maya Bozhilova
.
Model Cluster Routing Algorithm for Mobile Self-Organizing Defense and Security Networks
In
Scientific Conference with International Participation "The 21st Century Knowledge Society and Humanism," Sofia, (UniBIT, BAS)
.
Google Scholar
(link is external)
RTF
EndNote XML
Jolicoeur, Pierre
, and
Frederic Labarre
.
"
NATO’s engagement in the South Caucasus: Looking for Energy Security or Expanding Norms and Values?
" In
Reassessing Security in the South Caucasus: Regional Conflicts and Transformation
, 163-167. Farnham: Ashgate.
Google Scholar
(link is external)
RTF
EndNote XML
Thoß, Bruno
.
NATO-Strategie und nationale Verteidigungsplanung: Planung und Auf¬bau der Bundeswehr unter den Bedingungen einer massiven atomaren Vergel¬tungs¬strategie 1952 bis 1960
. München: München: Oldenbourg Verlag.
Google Scholar
(link is external)
RTF
EndNote XML
"
Nuklearstrategie – Zwischen Abschreckung und Einsatzdoktrin
(link is external)
."
Bundeszentrale für politische Bildung
.
Google Scholar
(link is external)
RTF
EndNote XML
Dai, You
,
Jin Yan
,
Xiaoxin Tang
,
Han Zhao
, and
Minyi Guo
.
"
Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies
." In
IEEE Trustcom/BigDataSE/ISPA
. Tianjin, China .
Google Scholar
(link is external)
RTF
EndNote XML
Ordinance of the Council of Ministers of 15 December 2009
.
Google Scholar
(link is external)
RTF
EndNote XML
S., Gaw
, and
Felten E.W.
.
Password Management Strategies For Online Accounts
. USA: Symposium on Usable Privacy and Security (SOUPS) 2006.
Google Scholar
(link is external)
RTF
EndNote XML
Gupta, P.
.
"
Pesticide Exposure
."
Toxicology Consulting Services Inc.
198: 83-90.
Google Scholar
(link is external)
RTF
EndNote XML
Gladkevich, Yury
.
"
Poshel v Gory
."
Profil
.
Google Scholar
(link is external)
RTF
EndNote XML
Shakespeare-Finch, Jane
,
Ian Shochet
,
Colette Roos
,
Cameron Craig
,
Deanne Maree Armstrong
,
Ross Young
, and
Astrid Wurfl
.
Promoting Posttraumatic Growth in Police Recruits: Preliminary Results of a Randomised Controlled Resilience Intervention Trial
(link is external)
In
Australian and New Zealand Disaster and Emergency Management Conference: Book of Proceedings
. Australia: Association for Sustainability in Business Inc.
Google Scholar
(link is external)
RTF
EndNote XML
Remittance Prices Worldwide: Making Markets More Transparent
(link is external)
. The World Bank.
Google Scholar
(link is external)
RTF
EndNote XML
Reply by the Federal Government: Procurement of weapons from the East by the Federal Intelligence Service and transit shipment to friendly states
In
Bundestag print
.
Google Scholar
(link is external)
RTF
EndNote XML
Linkevicius, Linas
.
"
Reset with Russia, but with Reassurance
."
International Herald Tribune
.
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
849
850
851
852
853
854
855
856
857
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top