Biblio

Export 21387 results:
2010
Babor, Thomas F., Jonathan P. Caulkins, Griffith Edwards, Benedikt Fischer, David R. Foxcroft, Keith Humphreys, Isidore S. Obot, Jürgen Rehm, and Peter Reuter. Drug Policy and the Public Good. Oxford: Oxford University Press, 2010.
Makochekanwa, Albert, and Marko Kwaramba. Dwindling access to basic services in Zimbabwe., 2010.
Vatsa, Mayank, Richa Singh, Afzel Noore, and Arun Ross. "On the Dynamic Selection of Biometric Fusion Algorithms." IEEE Transactions on Information Forensics and Security 5, no. 3 (2010).
Saradzhyan, Simon. "The Dynamics of Russia’s Response to the Piracy Threat." Connections: The Quarterly Journal 9, no. 3 (2010): 21-46.
Dempsey, Judy. "Eastern Europe Unites over Energy." International Herald Tribune (2010): 15.
Dimitrov, Dimitar. Economic Analysis “Cost/Benefit” in Defense and Security. Sofia: Stopanstvo, 2010.
Bahney, Benjamin, Howard J. Shatz, Carroll Ganier, Renny McPherson, and Barbara Sude. An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq. Santa Monica, CA: RAND, 2010.
Melese, F.. Economic Evaluation of Alternatives., 2010.
Donnet, LTC. EEAW: Embryonic Component of Future European Air Combat?., 2010.
Tagarev, Todor. Effective Resource Management in a Good Governance Context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Gaddam, Sunil V. K., and Manohar Lal. "Efficient Cancellable Biometric Key Generation Scheme for Cryptography." International Journal of Network Security 11, no. 2 (2010): 61-69.
Nikooghadam, Morteza, Farshad Safaei, and Ali Zakerolhosseini. "An efficient key management scheme for mobile agents in distributed networks." In 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010) . Solan, India , 2010.
Olivola, Christopher Y., and Alexander Todorov. "Elected in 100 milliseconds: Appearance-Based Trait Inferences and Voting." Journal of Nonverbal Behavior 34, no. 2 (2010): 83-110.
Georgiev, Venelin. "Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects." Information & Security: An International Journal 25 (2010): 99-112.
Marmor, Yariv. Emergency-Departments Simulation in Support of Service-Engineering: Staffing, Design, and Real-Time Tracking In Senate of the Technion. Vol. Doctor of Philosophy. Haifa: Israel Institute of Technology Shvat, 2010.
Jacoby, Tim, and Eric James. "Emerging patterns in the reconstruction of conflict-affected countries." Disasters 34, no. Supplement s1 (2010): S1-S14.
Arvidsson, Claes. "En värld – två alternative." Svenska Dagbladet (2010).
Tagarev, Todor. "Enabling Factors and Effects of Corruption in the Defense Sector." Connections: The Quarterly Journal 9, no. 3 (2010): 77-88.
Stoianov, Nikolai Todorov, and Veselin Tsenov Tselkov. E-Net Models of a Software System for E-Mail Security In Computer Science, Cryptography and Security., 2010.
Stoianov, Nikolai Todorov, and Veselin Tsenov Tselkov. E-Net Models of a Software System for Web Pages Security In Computer Science, Cryptography and Security., 2010.
Goerzig, Carolin. Engaging Hamas: Rethinking the Quartet Principles. European Institute for Security Studies, 2010.
"Engaging Oceania." Naval War College Review (2010).
Chang, Ming-Hsin, I-Te Chen, and Ming-Te Chen. "Enhance ECDSA to Identity-based Proxy Signature Scheme." Journal of Information Assurance and Security (JIAS) 5 (2010).
Pohyl, Viktoriya. "The Enhanced Method and Informational Technology to Support the Func-tional Safety of the Aircrafts Onboard Information-Control Systems on Their Design Stage." Science and Technology of the Air Force 2 (2010).
Pohyl, Viktoriya. "The Enhanced Method of the Functional Safety of the Aircraft Onboard Information-Control Systems Analysis and Estimation." Systems of Arms and Military Equipment 2 (2010): 136-42.

Pages