Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21387 results:
RTF
EndNote XML
2004
Picco, Giandomenico
.
Tactical and Strategic Terrorism
. New York, NY: GDP Associates, 2004.
Google Scholar
RTF
EndNote XML
Tchamova, A.
,
J. Dezert
,
Tz. Semerdjiev
, and
P. Konstanttinova
.
Target Tracking with Generalized Data Association based on the General DSm Rule of Combination
In
Conference Fusion
. Sweden, 2004.
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
,
Michael Yastrebenetsky
, and
Vladimir Sklyar
.
The Technique and the Experience of Expertise of Software for NPP Instrumentation and Control Systems
In
7th International Conference on Probabilistic Safety Assessment and Management
. Berlin, 2004.
DOI
Google Scholar
RTF
EndNote XML
Cilinskas, Kestutis
.
Teisės viršenybės principo įgyvendinimo problemos
. International Human Rights Day, 2004.
Google Scholar
RTF
EndNote XML
Welch, Matt
.
"
Temporary Doves
."
Reason Magazine
(2004).
Google Scholar
RTF
EndNote XML
Weimann, Gabriel
.
"
Terror on the Internet: The New Arena, The New Challenges
." In
International Studies Association (ISA) Annual Conference
. Montreal, Quebec, Canada, 2004.
Google Scholar
RTF
EndNote XML
Busuncian, Tatiana
.
Terrorism and Organized Crime” report presented within the “NATO Defense against Terrorism Course
. Oberammergau, Germany: the NATO School, 2004.
Google Scholar
RTF
EndNote XML
Zimmermann, Doron
.
"
Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception
."
Connections: The Quarterly Journal
3, no. 1 (2004): 19-39.
DOI
Google Scholar
RTF
EndNote XML
Gunaratna, Rohan
.
"
The Terrorist Threat to the Continent
." In
Meeting of the Special Committee of NATO, Ministry of Foreign Affairs
. Copenhagen, 2004.
Google Scholar
RTF
EndNote XML
Emery, N.E.
,
R. S. Earl
, and
R. Buettner
.
"
Terrorist Use of Information Operations
."
Journal of Information Warfare
3, no. 2 (2004).
Google Scholar
RTF
EndNote XML
Libbenga, Jan
.
"
Terrorists Grow Fat on E-Mail Scams
."
The Register
(2004).
Google Scholar
RTF
EndNote XML
Shevtsova, Liliya
.
"
A test with Ukraine. Will Putin and the regime created by him pass it?
"
Novaya Gazeta
(2004).
Google Scholar
RTF
EndNote XML
Smith, Greg B.
.
"
They Eyed Subway Stations
."
New York Daily News
(2004).
Google Scholar
RTF
EndNote XML
Gold, David
.
"
Thinking Through Terrorism Some Economic Considerations in the U.S. War on Terrorism
."
Connections: The Quarterly Journal
3, no. 1 (2004): 1-14.
DOI
Google Scholar
RTF
EndNote XML
Berberich, Klaus
,
Michalis Vazirgiannis
, and
Gerhard Weikum
.
"
Time-Aware Authority Ranking
."
Internet Mathematics
2, no. 3 (2004): 301-332.
Google Scholar
RTF
EndNote XML
Danner, Mark
.
Torture and Truth: America, Abu Ghraib, and the War on Terror
. New York: Review of Books, 2004.
Google Scholar
RTF
EndNote XML
de la Roche, Roberta Senechal
.
"
Toward a Scientific Theory of Terrorism
."
Sociological Theory
22, no. 1 (2004): 1.
Google Scholar
RTF
EndNote XML
Noran, O.
, and
L.M. Camarinha-Matos
.
"
Towards a Meta-Methodology for Collaborative Networked Organisations. In Virtual Enterprises and Collaborative Networks
." In
IFIP International Federation for Information Processing
. Vol. 149. Boston, MA: Springer, 2004.
Google Scholar
RTF
EndNote XML
Maillard, Thierry
, and
Teddy Furon
.
"
Towards Digital Rights and Exemptions Management Systems
."
Computer Law and Security Report
20, no. 4 (2004): 281-87.
DOI
Google Scholar
RTF
EndNote XML
Born, Hans
.
"
Towards Effective Democratic Oversight of Intelligence Services: Lessons Learned from Comparing National Practices
."
Connections: The Quarterly Journal
3, no. 4 (2004): 1-12.
DOI
Google Scholar
RTF
EndNote XML
Eliasson, Johan
.
"
Traditions, Identity and Security: The Legacy of Neutrality in Finnish and Swedish Security Policies in Light of European Integration
."
European Integra tion online Papers
8, no. 6 (2004): 13.
Google Scholar
RTF
EndNote XML
Trafficking in Persons Report 2004
. U.S. Department of State , 2004.
Google Scholar
RTF
EndNote XML
Hamilton, Daniel
.
Transatlantic Transformations: Equipping NATO for the 21st Century
. Washington, D.C.: Center for Transatlantic Relations, 2004.
Google Scholar
RTF
EndNote XML
Polikanov, Dmitry
.
"
Transdnestria, Abkhazia, Chechnya: Pros and Cons of the EU Intervention
."
Connections: The Quarterly Journal
3, no. 2 (2004): 33-38.
DOI
Google Scholar
RTF
EndNote XML
Transport, Directorate-General for Energy
, and
European Commission
.
Trans-European En-ergy Networks: TEN-E Priority Projects
. Luxembourg: Office for Official Publications of the European Union, 2004.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
632
633
634
635
636
637
638
639
640
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance