Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2013
van Reijn, Joop
.
"
Resource management in an Intelligence and Security Service: a Dutch example
."
Information & Security: An International Journal
30, no. 1 (2013): 41-54.
Google Scholar
RTF
EndNote XML
Resources for ‘Training and Learning Architecture’ Webinar
. ADL Web site, 2013.
Google Scholar
RTF
EndNote XML
Grant, Rachel Staley
.
Rethinking Nuclear Deterrence and Burden-Sharing
. American Security Information Council (BASIC), 2013.
Google Scholar
RTF
EndNote XML
Roth, Kenneth
.
Rethinking Surveillance
., 2013.
Google Scholar
RTF
EndNote XML
Dalrymple, William
.
Return of the King: The Battle for Afghanistan
. London: Bloomsbury, 2013.
Google Scholar
RTF
EndNote XML
Kim, Cheonshik
,
YongSoo Choi
,
Hyoung-Joong Kim
,
Dongkyoo Shin
, and
Dongil; Shin
.
"
Reversible Data Hiding for Halftone Images Using Histogram Modification
."
International Information Institute (Tokyo). Information; Koganei
16, no. 3 (2013): 1861-1872.
Google Scholar
RTF
EndNote XML
Liao, Hung-Jen
,
Chun-Hung Richard Lin
,
Ying -Chih
, and
Kuang-Yuan Tung
.
"
Review: Intrusion detection system: A comprehensive review
."
Journal of Network and Computer Applications
(2013).
DOI
Google Scholar
RTF
EndNote XML
"
Review of European Standards on ICT competences
."
Information Management (in Russian)
7 (2013): 30-35.
Google Scholar
RTF
EndNote XML
Briggs, Rachel
, and
Sebastien Feve
.
Review of Programs to Counter Narratives of Violent Extremism: What Works and What are the Implications for Government?
. Institute for Strategic Dialogue, 2013.
Google Scholar
RTF
EndNote XML
Lackenbauer, Helené
, and
Richard Langlais
.
Review of the Practical Implementation of UNSCR 1325 for the Conduct of NATO-led Operations and Missions
. Stockholm: Swedish Defence Research Agency FOI, 2013.
Google Scholar
RTF
EndNote XML
Lackenbauer, Helené
, and
Richard Langlais
.
Review of the Practical Implications of UNSCR 1325 for the Conduct of NATO-led Operations and Missions
. Stockholm: Swedish Defense Research Agency (FOI), 2013.
Google Scholar
RTF
EndNote XML
RF Foreign Policy Concept
In
Approved by RF President V.V. Putin
., 2013.
Google Scholar
RTF
EndNote XML
Bongo, Pathias P.
,
Paul Chipangura
,
Mkhokheli Sithole
, and
Funa Moyo
.
"
A rights-based analysis of disaster risk reduction framework in Zimbabwe and its implications for policy and practice
."
Journal of Disaster Risk Studies
5, no. 2 (2013): article 81.
Google Scholar
RTF
EndNote XML
Thompson, James
.
"
The Rise of All
."
Connections: The Quarterly Journal
12, no. 3 (2013): 63-86.
DOI
Google Scholar
RTF
EndNote XML
Kahler, Miles
.
"
Rising Powers and Global Governance: Negotiating Change in a Resilient Status Quo
."
International Affairs
89, no. 3 (2013): 711-29.
Google Scholar
RTF
EndNote XML
Beaula, Thangaraj
, and
J.Partheeban
.
"
Risk Assessment of Natural Hazards in Nagapattinam District Using Fuzzy Logic Model
."
International Journal of Fuzzy Logic Systems (IJFLS)
3, no. 3 (2013).
Google Scholar
RTF
EndNote XML
"
Riven doviry ukrayintsiv do vlady – odyn z najnyzhchykh u Yevropi
."
The Ukrainian Week
(2013).
Google Scholar
RTF
EndNote XML
Riyadh asks GCC states to condemn Qatar’s actions in Egypt and Yemen
. Vol. 25 November 2013. Middle East Monitor, 2013.
Google Scholar
RTF
EndNote XML
Balzarotti, D.
,
E. Markatos
, and
Z. Minchev
.
"
A Roadmap in the area of Systems Security
." In
The Red Book
. SysSec Consortium, 2013.
Google Scholar
RTF
EndNote XML
Kumar, Manoj
,
Mridul Kumar Gupta
, and
Saru Kumari
.
"
A Robust Remote User Authentication Scheme using Smart Card
."
Information & Security: An International Journal
26, no. 2 (2013): 79-97.
Google Scholar
RTF
EndNote XML
Ali, Farhana
.
"
Rocking the Cradle to Rocking the World: The Role of Muslim Female Fighters
."
Journal of International Women’s Studies
8, no. 1 (2013): 21-35.
Google Scholar
RTF
EndNote XML
Fox, Jesse
,
Katie M. Warber
, and
Dana C. Makstaller
.
"
The Role of Facebook in Romantic Relationship Development: An Exploration of Knapp’s Relational Stage Model
."
Journal of Social and Personal Relationships
30, no. 6 (2013): 771-794.
Google Scholar
RTF
EndNote XML
Mlavius-Cristian, Ciorei
, and
Mihaela Andreea
.
"
The Role of Intelligenceărcău F in the Fight Against Terror
."
European Scientific Journal
9, no. 2 (2013).
Google Scholar
RTF
EndNote XML
Connell, Raewyn W.
.
"
The Role of Men and Boys in Achieving Gender Equality
." In
UN Expert Group Meeting on “The role of men and boys in achieving gender equality”
. Brasilia, Brazil, 2013.
Google Scholar
RTF
EndNote XML
Gerasimov, Valery
.
The role of the General Staff in the defence of the country in accordance with the new regulations on the General Staff approved by the President of the Russian Federation
In
speech at the meeting of members of the Academy of Military Sciences
., 2013.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
309
310
311
312
313
314
315
316
317
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance