Biblio

Export 21393 results:
2010
Annual Report 2009. Internal Security Agency, 2010.
Brunner, Martin, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt. "Anonymity and Privacy in Distributed Early Warning Systems." In CRITIS 2010: Critical Information Infrastructures Security., 2010.
O'Connor, Brendon, and Srdjan Vucetic. "Another Mars–Venus divide? Why Australia said ‘yes’ and Canada said ‘non’ to involvement in the 2003 Iraq War." Australian Journal of International Affairs, Volume 64, 2010 - Issue 5 64, no. 5 (2010): 526-548.
Bitter, Christian, David A. Elizondo, and Tim Watson. "Application of Artificial Neural Networks and Related Techniques to Intrusion Detection." In The 2010 International Joint Conference on Neural Networks (IJCNN)., 2010.
Procházková, Dana. Application of SWOT Analysis and of Selected Types of Case Studies at Selection of Model for Strategic Territory Safety Management., 2010.
Giacobe, Nicklaus A.. Application of the JDL Data Fusion Process Model for Cyber Security In Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications. Vol. 7710. SPIE, 2010.
Ikenson, Daniel. Appreciate This: Chinese Currency Rise Will Have a Negligible Effect on the Trade Deficit. Washington, D.C.: CATO Institute, 2010.
On the approval of the Updated Individual Partnership Action Plan the Republic of Moldova – NATO In Government Decision of the Republic of Moldova., 2010.
Johnson, Gregory D.. "AQAP in Yemen and the Christmas Day Terrorist Attacks." CTC Sentinel Special Issue (2010): 1-4.
Coates, Kenneth, Whitney Lackenbauer, William Morrison, and Greg Poelzer. Arctic Front: Defending Canada in the Far North. Toronto: Thomas Allen , 2010.
Bloomfield, Lincoln P.. " The Arctic: Last Unmanaged Frontier." Foreign Affairs 60, no. 1 (2010).
Zajas, Stanisław. "The Armed Forces’ Development at the Beginning of the Twenty-First Century from the Polish Perspective." Connections: The Quarterly Journal 9, no. 4 (2010): 97-105.
Nichol, Jim. Armenia, Azerbaijan, and Georgia: Security Issues and Implications for U.S. Interests In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2010.
Mirzoyan, Alla. Armenia, the Regional Powers, and the West: Between History and Geopolitics. Palgrave Macmillan, 2010.
Tsakiris, George, Harris Vangelis, and Dimitris Tigkas. "Assessing Water System Vulnerability to Drought to Multi-year Droughts." European Water 29 29 (2010): 21-29.
Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Idaho Falls, ID: Idaho National Laboratory, 2010.
Deriglazova, Larisa. "Asymmetric character of contemporary conflicts." Geopolitics Magazine (2010).
Markoff, John. "At Internet Conference, Signs of Agreement Appear Between U.S. and Russia ." The New York Times (2010).
Judah, Tim. "At Last, Good News from the Balkans." New York Review of Books (2010).
Möckli, Daniel. Auslandeinsätze der Armee: Stand und Optionen In CSS Analysen zur Sicherheitspolitik. Vol. 67. Zürich: CSS ETH Zürich, 2010.
Automated software testing as a service., 2010.
Candea, G., S. Bucur, and C. Zamfir. Automated software testing as a service In 1st Symposium on Cloud Computing (SOCC’10)., 2010.
Fuller, Liz, and Richard Giragosian. Azerbaijan’s Unsinkable General In Radio Free Europe/Radio Liberty (RFE/RL) Caucasus Report., 2010.
"Azerbaijan to Nearly Double Defense Spending." Agency France-Presse (2010).
Levy, Jack S., and William R. Thompson. "Balancing on Land and at Sea: Do States Ally Against the Leading Global Power?" International Security 35, no. 1 (2010): 11.

Pages