Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2013
"
Intelligent Oversight
."
Guardian
(2013): 13.
Google Scholar
RTF
EndNote XML
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
Google Scholar
RTF
EndNote XML
International Law of Cyber Operations
. NATO Cooperative Cyber Defense Centre of Excellence Web Site, 2013.
Google Scholar
RTF
EndNote XML
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
Google Scholar
RTF
EndNote XML
Meltzer, Joshua P.
.
"
The Internet, Cross-Border Data Flows and International Trade
."
SSRN Electronic Journal
(2013).
DOI
Google Scholar
RTF
EndNote XML
Antoliš, Krunoslav
.
"
Internet Forensics and Combating Terrorism
." In
The Dangerous Landscape
, 37-45., 2013.
Google Scholar
RTF
EndNote XML
The Internet Of Everything – Global Private Sector Economic Analysis
. Cisco, 2013.
Google Scholar
RTF
EndNote XML
Tagawa, Yoshihiro
.
"
Internet Riyou ni okeru Tsushin no Himitsu [Secrecy of communication in the Use of the Internet]
."
Science of Information Security
5, no. 1 (2013): 33.
Google Scholar
RTF
EndNote XML
Soyer, Hubert
.
"
Internet Science Risk, Risk Perception, and Cyberwar
."
Network Architectures and Services
(2013).
Google Scholar
RTF
EndNote XML
Interview of State Secretary-Deputy Minister of Foreign Affairs of Russia G.B. Karasin in Rossijskaya gazeta, 269-13-02-2013
. Vol. 13 February 2013. Official website of the Russian Ministry of Foreign Affairs, 2013.
Google Scholar
RTF
EndNote XML
Interview with Georgian Defense Minister Irakli Alasania
., 2013.
Google Scholar
RTF
EndNote XML
Interview with Kyrgyz Minister of Defense Taalaybek Omuraliev
. Radio Azzatyk, 2013.
Google Scholar
RTF
EndNote XML
Mayer, Timothy R.
.
Intractability and Mediation of The Nagorno-Karabakh Conflict
. Monterey, California: Naval Postgraduate School, 2013.
Google Scholar
RTF
EndNote XML
Brassett, James
,
Stuart Croft
, and
Nick Vaughan‐Williams
.
"
Introduction: An Agenda for Resilience Research in Politics and International Relations
."
Politics
33, no. 4 (2013): 221-228.
Google Scholar
RTF
EndNote XML
Boot, Max
.
Invisible Armies
. New York: Liveright, 2013.
Google Scholar
RTF
EndNote XML
Iran Launches Destroyer in Caspian Sea
. Radio Free Europe/Radio Liberty, 2013.
Google Scholar
RTF
EndNote XML
Feiler, Michael
.
"
Islamic Extremism – Analyzing the Risks
." In
The Dangerous Landscape
, 87-97., 2013.
Google Scholar
RTF
EndNote XML
Carter, Chelsea J.
.
It’s a three-decade first: Presidents of U.S., Iran talk directly, if only by phone
. Vol. 28 September 2013. CNN, 2013.
Google Scholar
RTF
EndNote XML
Mevassvik, Ole Martin
,
Bråthen Karsten
, and
Richard Moe Gustavsen
.
JADE – An Experiment in Distributed Simulation Based Joint Tactical Training
., 2013.
Google Scholar
RTF
EndNote XML
Reitman, Janeit
.
"
Jahar’s World
."
Rolling Stone
9 (2013).
Google Scholar
RTF
EndNote XML
"
Japan Starts the Production of ‘Burning Ice’
."
Capital
(2013).
Google Scholar
RTF
EndNote XML
Joint Action Plan for Prevention and Combat with Cybercrime for the Period 2013 – 2015
In
Office of the Prosecutor General
., 2013.
Google Scholar
RTF
EndNote XML
Commission, European
.
Joint Communication to The European Parliament, The Council, The European Economic and Social Committee and The Committee of the Regions
. Brussels, 2013.
Google Scholar
RTF
EndNote XML
Joint Declaration of the Eastern Partnership Summit
. Vilnius, 2013.
Google Scholar
RTF
EndNote XML
Hu, Yu-Chen
,
Chun-Chi Lo
,
Wu-Lin Chen
, and
Chia-Hsien Wen
.
"
Joint image coding and image authentication based on absolute moment block truncation coding
."
Journal of Electronic Imaging
22, no. 1 (2013).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
297
298
299
300
301
302
303
304
305
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance