Biblio

Export 21393 results:
2012
Giegerich, Bastian, and Alexandra Jonas. "Auf der Suche nach best practice? Die Entstehung nationaler Sicherheitsstrategien im internationalen Vergleich." Security and Peace 3, no. 30 (2012): 129-183.
On August 27–September 2, at least 50 Persons Fell Victim to Armed Conflict in Northern Caucasus. Caucasian Knot, 2012.
Learn, ATW. Author Archives: kelleycatt., 2012.
Chou, Gloria. "Autonomy in Xinjiang: Institutional Dilemmas and the Rise of Uighur Ethno-Nationalism." The Josef Korbel Journal of Advanced International Studies 4 (2012): 170.
D'Mello, Sidney, and Art Graesser. "AutoTutor and affective autotutor: Learning by talking with cognitively and emotionally intelligent computers that talk back." ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems 2, no. 4 (2012).
Weber, Keith. Azerbaijan and Turkmenistan Disputes and the Tragedy of the Commons. Rep’s Blog, Center for Strategic and International Studies, 2012.
Azerbaijan Angered by Turkmenistan’s Work on Disputed Caspian Field. Azernews, 2012.
Azerbaijan's Military Exercises in the Caspian: Who Is the Target?. Eurasia Daily Monitor, Jamestown Foundation, 2012.
T., Əhmədov. "Azərbaycan-NATO əlaqələri genişlənir." Respublika qəzeti, 046 (2012): 1.
Iliev, Mladen. A Balanced Scorecard for Managing the National Service for Protection In It4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Strjuk, Aleksey, Oleg Odarushchenko, and Valentina Odarushchenko. "Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service." Information & Security: An International Journal 28, no. 1 (2012): 133-145.
Rukavishnikov, Vladimir. "The bear and the world: Projections of Russia’s policy after Putin’s return to Kremlin in 2012." Medjunarodni problemi 64, no. 1 (2012): 7-33.
Dheepa, V., and R. Dhanapal. "Behavior Based Credit Card Fraud Detection Using Support Vector Machines." ICTACT Journal on Soft Computing 2, no. 4 (2012).
Putin, Vladimir. "Being Strong: National Security Guarantees for Russia." The Huffington Post (2012).
Vasilev, Iliyan. The Belene NPP Project – Mission Impossible?. Centre for Balkan and Black Sea Studies, 2012.
Best Practices Paper. Sharing among Domestic Competent Authorities. Information Related to the Financing of Proliferation. The Financial Action Task Force, 2012.
Healey, Jason. Beyond Attribution: Seeking National Responsibility for Cyber Attacks In January Issue Brief 2012. Atlantic Council, 2012.
Braun, Thomas. "Beyond Counterinsurgency: Why the Concept is Failing." Connections: The Quarterly Journal 11, no. 3 (2012): 77-84.
Baaz, Maria Eriksson, and Mats Utas. "Beyond ‘Gender and Stir’." In Beyond ‘Gender and Stir’: Reflections on Gen¬der and SSR in the Aftermath of African Conflicts, 9. Uppsala: The Nordic Africa Institute, 2012.
Smolny, Dabrowka. "Bezpieczeństwo niemilitarne jako perspektywa rozwoju polskiego przemy-słu obronnego." Szybkobieżne Pojazdy Gąsienicowe, Biuletyn Naukowo-Techniczny 30, no. 12 (2012): 16.
Marz, Nathan, and James Warren. Big Data: Principles and best practices of scalable realtime data systems. Manning, 2012.
Maiti, Chinmay, and Bibhas Chandra Dhara. "A binary watermarking scheme using quantization levels of BTC-PF method." In International Conference on Communications, Devices and Intelligent Systems (CODIS). Kolkata, India , 2012.
Boko Haram’s kingpin confesses: Top Police officers helped me to escape., 2012.
Sims, Christopher, Fernando Luján, and Bing West. "Both Sides of the COIN: Defining War After Afghanistan." Foreign Affairs (2012).
Briefing by L. Brahimi to the UN Security Council In closed consultations., 2012.

Pages