Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2014
Simons, Hans Jozef Adri
.
Consensual Hallucinations the Politics of Identity in Dutch Cyber Security Policy
. Vol. Master of Science in Political Science. Radboud University Nijmegen, 2014.
Google Scholar
RTF
EndNote XML
Wierzbowska-Miazga, Agata
, and
Tadeusz A. Olszański
.
"
The Consequences of the Annexation of Crimea
."
Center for Eastern Studies (OSW), Analyses
(2014).
Google Scholar
RTF
EndNote XML
Hernández, Francisco José Bere
.
Consideraciones geoestratégicas y geopolíticas en torno a la energía
. Cuadernos de Estrategia, 2014.
Google Scholar
RTF
EndNote XML
Constitution of the Republic of Romania
., 2014.
Google Scholar
RTF
EndNote XML
Chambers, Paul
.
"
Constitutional Change and Security Forces in Southeast Asia: Lessons from Thailand and Myanmar, Contemporary Southeast Asia
."
A Journal of International and Strategic Affairs
36, no. 1 (2014): 101-127.
Google Scholar
RTF
EndNote XML
Mateu, Víctor
,
Francesc Sebé
, and
Magda Valls
.
"
Constructing credential-based E-voting systems from offline E-coin protocols
."
Journal of Network and Computer Applications
42 (2014): 39-44.
Google Scholar
RTF
EndNote XML
Zuma, Buhle
.
"
Contact Theory and the Concept of Prejudice: Metaphysical and Moral Explorations and an Epistemological Question
."
Theory & Psychology
24, no. 1 (2014): 40-57.
Google Scholar
RTF
EndNote XML
Gawlik-Kobylińska, Małgorzata
, and
Monika Lewińska
.
"
Content Language Integrated Learning in Polish Higher Military Education
."
Connections: The Quarterly Journal
13, no. 3 (2014): 105-115.
DOI
Google Scholar
RTF
EndNote XML
Malthaner, Stefan
.
"
Contextualizing Radicalization: The Emergence of the “Sauerland-Group” from Radical Networks and the Salafist Movement
."
Studies in Conflict and Terrorism
37, no. 8 (2014): 638-653.
Google Scholar
RTF
EndNote XML
Ben Dhiaf, Zouhour
,
Fatm Haouas
, and
Atef Hamouda
.
"
Contributions in belief functions and plausible and paradoxical reasoning theories: Application to supervised classification of satellite images
." In
International Image Processing, Applications and Systems Conference
. Sfax, Tunisia, 2014.
Google Scholar
RTF
EndNote XML
Convergence of Chemistry and Biology: Report of the Scientific Advisory Board’s Temporary Working Group
. The Hague: OPCW: Organisation for the Prohibition of Chemical Weapons, 2014.
Google Scholar
RTF
EndNote XML
Kühn, Ulrich
.
"
Cooperative Arms Control in Europe: The Consequences of Complexity, Decay, Power, and Norms
." In
Expert Roundtable on Conventional Arms Control and Confidence-Building Measures in Europe, OSCE Security Days
. Vienna, 2014.
Google Scholar
RTF
EndNote XML
"
Cops or Soldiers?
"
The Economist
(2014).
Google Scholar
RTF
EndNote XML
Corruption and Anti-Corruption in Bulgaria (2013-14)
. Sofia: Center for Study of Democracy (CSD), 2014.
Google Scholar
RTF
EndNote XML
Council Decision of 24 June 2014 on the Arrangements for the Implementation by the Union of the Solidarity Clause
., 2014.
Google Scholar
RTF
EndNote XML
Zetter, Kim
.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
. New York: Crown, 2014.
Google Scholar
RTF
EndNote XML
"
Countering Hybrid Threats: Challenges for the West
."
Strategic Comments
2014, no. 40 (2014): 21.
Google Scholar
RTF
EndNote XML
Peters, Allison
.
Countering Terrorism and Violent Extremism in Pakistan: Why Policewomen Must Have a Role
In
Policybrief
. Institute for Inclusive Security, 2014.
Google Scholar
RTF
EndNote XML
Patil, Sameer
.
Counter-Terrorism and Federalism
. Gateway House (Indian Council on Global Relations), 2014.
Google Scholar
RTF
EndNote XML
Holehouse, Matthew
.
"
Counter-Terrorism Bill: What It Contains
."
Telegraph
(2014).
Google Scholar
RTF
EndNote XML
Li, Xingan
, and
Martti Juhola
.
"
Country crime analysis using the self-organizing map, with special regard to demographic factors
."
AI & SOCIETY
29, no. 1 (2014): 53-68.
Google Scholar
RTF
EndNote XML
Takacs, Viktoria
, and
Piotr Matczak
.
Country study: Hungary
In
Analysis of Civil Security Systems in Europe
., 2014.
Google Scholar
RTF
EndNote XML
Matczak, Piotr
, and
Grzegorz Abgarowicz
.
Country study: Poland
In
Analysis of Civil Security Systems in Europe. Accessed
., 2014.
Google Scholar
RTF
EndNote XML
Pulkki, Arto
.
"
Crimea Invaded by High Readiness Forces of the Russian Federation
."
Suomen Sotilas
(2014).
Google Scholar
RTF
EndNote XML
Carlile, L.
, and
S. MacDonald
.
"
The criminalisation of terrorists' online preparatory acts
." In
Cyberterrorism: Understanding, Assessment, and Response
, 155-173., 2014.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
239
240
241
242
243
244
245
246
247
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance