Biblio

Export 21404 results:
2005
Schleifer, Yigal. "Russian Oil Ships Stuck in Bosporus Strait Traffic Jam." Christian Science Monitor (2005).
Surtees, Rebecca. Second Annual Report on Victims of Trafficking in Human Beings in South Eastern Europe. Geneva: International Organization for Migration, 2005.
Quijano, Elaine. Secret Service Told Grenade Landed near Bush: U.S. Officials Investigating Alleged Incident in Georgia. CNN.com, 2005.
Liao, I-En, Cheng-Chi Lee, and Min-Shiang Hwang. Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme In International Conference on Next Generation Web Services Practices., 2005.
Bryden, Alan, and Heiner Hänggi. Security Governance in Post-Conflict Peacebuilding. DCAF, 2005.
Shalamanov, Velizar. The Security of the Black Sea Region in the Context of NATO’s Expansion: Opportunities for Cooperation In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2005.
Chitadze, Nika. "Security Problems within Post-Soviet Space." Connections: The Quarterly Journal 4, no. 2 (2005): 1-4.
Anderlini, Sanam Naraghi, and Camille Pampell Conaway. "Security Sector Reform." In Inclusive Security, Sustainable Peace, 31., 2005.
Avagyan, Gagik, and Duncan Hiscock. Security Sector Reform in Armenia. London: Safeworld, 2005.
Lantermann, Ernst-Dieter, and Elke Döring-Seipel. Selbstverantwortliches Lernen in der Auseinandersetzung mit Unsicherheit und Risiko unter den Bedingungen des globalen Wandels. Universität Kassel, 2005.
Gadeyne, Klaas. Sequential Monte Carlo Methods for Rigorous Bayesian Modeling of Autonomous Compliant Motion (Recursieve Monte Carlo methodes voor het autonoom uitvoeren van robottaken in contact). Vol. dissertation. KU Leuven, 2005.
Gadeyne, Klaas. Sequential Monte Carlo methods for rigorous Bayesian modeling of Autonomous Compliant Motion. K.U.Leuven, Dept. Werktuigkunde, 2005.
Peterson, G. D.. "Service Oriented Security Architecture." nformation Security Bulletin 10 (2005): 325-30.
R., Haenni. "Shedding New Light on Zadeh’s Criticism of Dempster’s Rule of Combination." In Proceedings of Information Fusion. Philadelphia, 2005.
R., Haenni. Shedding New Light on Zadeh’s Criticism of Dempsters Rule of Combination In Fusion 2005 Conference. Philadelphia, 2005.
Bonàs, Mònica Casabayó. Shopping behaviour forecasts: Experiments based on a fuzzy learning technique in the Spanish food retailing industry. Vol. PhD . Barcelona, Spain: The University of Edinburgh, 2005.
Dezert, Jean, and Florentin Smarandache. A short overview on DSmT for Information Fusion In 10th Int. Conf. on Fuzzy Theory and Techn. Salt Lake City, Utah, USA, 2005.
The Significance of Sino-Russian Military Exercises., 2005.
Smarandache, Florentin, and Jean Dezert. "A Simple Proportional Conflict Redistribution Rule." International Journal of AppliedMathematics & Statistics 3, no. J05 (2005): 1-36.
Niemeyer, Klaus. "Simulation of Critical Infrastructure." Information & Security : An International Journal 17 (2005): 120-143.
Niemeyer, Klaus. "Simulation of Critical Infrastructures." Information & Security: An International Journal 17 (2005): 120-143.
A Single Army for the 21st Century. Sarajevo: Final Report by the Defense Reform Commission, 2005.
Prezelj, Iztok, and Marija Gaber. Smuggling as a Threat to National and International Security: Slovenia and the Balkan Route In Athena Papers. Vol. 5. Garmisch-Partenkirchen: Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2005.
Dunn, Myriam. "The socio-political dimensions of critical information infrastructure protection (CIIP)." International Journal of Critical Infrastructures 1, no. 2/3 (2005).
Fluri, Philipp H., and Miroslav Hadzic. Sourcebook on Security Sector Reform. Belgrade/Geneva: DCAF, 2005.

Pages