Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2014
Vallacher, Robin R.
,
Peter T. Coleman
,
Andrzej Nowak
,
Lan Bui Wrzosinska
,
Larry Liebovitch
,
Katharina Kugler
, and
Andrea Bartoli
.
Attracted to Conflict: Dynamic Foundations of Destructive Social Relations
. 2013th ed. New York: Springer, 2014.
Google Scholar
RTF
EndNote XML
Audit Report # 0300002413 on “Prevention and Response to Forest Fires” for the period 1 January 2011 – 31 December 2013
. Bulgarian National Audit Office, 2014.
Google Scholar
RTF
EndNote XML
Pradhan, Mahendra Kumar
, and
Nitin Jain
.
"
Authentication & Verification of Secure Parking Using OCR Technique
."
Advance in Electronic and Electric Engineering
4, no. 2 (2014): 127-134.
Google Scholar
RTF
EndNote XML
Liou, Cheng-Yuan
,
Wei-Chen Cheng
,
Jiun-Wei Liou
, and
Daw-Ran Liou
.
"
Autoencoder for words
."
Neurocomputing
139, no. 2 (2014): 84-96.
DOI
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
,
Yuriy Ponochovnyi
, and
Artem Boyarchuk
.
"
Availability Assessment of Information and Control Systems with Online Software Update and Verification
."
Information and Communication Technologies in Education, Research, And Industrial Applications
469 (2014): 300-324.
DOI
Google Scholar
RTF
EndNote XML
Jarosiewicz, Aleksandra
.
Azerbejdżan – narastający problem dla Zachodu [Azerbaijan – A Growing Problem for the West]
In
Komentarze
. Warsaw: Ośrodek Studiów Wschodnich [Centre for Eastern Studies], 2014.
Google Scholar
RTF
EndNote XML
Sherwell, Philip
.
"
Babar Ahmad sentenced to 12.5 years for supporting Islamic terrorists
."
The Telegraph
(2014).
Google Scholar
RTF
EndNote XML
Gur, Mehmet
.
The Balancing Role Of Turkey For The Influence Of China In Central Asia
. Vol. Dissertation. Monterey, California: Naval Postgraduate School, 2014.
Google Scholar
RTF
EndNote XML
On the basic principles to ensure cyber security of Ukraine
In
Law of Ukraine, Draft. Accessed
., 2014.
Google Scholar
RTF
EndNote XML
"
The Beach Town That’s a Favorite ISIS Recruiting Spot
."
Cold Turkey, last modified
(2014).
Google Scholar
RTF
EndNote XML
Wright, Hannah
.
Beijing, 1325 and Beyond: Taking Women, Peace and Security Back to its Roots
. Saferworld, 2014.
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
"
Below the Threshold’ Cyber Operations: The Countermeasures Response Option and International Law
."
Virginia Journal of International Law
(2014): 697-732.
Google Scholar
RTF
EndNote XML
Mancas, Cătălina
.
"
Best Practices in Distributed Learning Environments
."
ELearning & Software for Education
3 (2014): 272-279.
Google Scholar
RTF
EndNote XML
Beyond Red vs. Blue: The Political Typology
., 2014.
Google Scholar
RTF
EndNote XML
Shackelford, S. J.
, and
A. N. Craig
.
"
Beyond the New Digital Divide: Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity
."
Stanford Journal of International Law
50, no. 1 (2014).
Google Scholar
RTF
EndNote XML
Bibilov: The Treaty on Integration with the Russian Federation will Reflect the Interests of South Ossetia (Bibilov: Dogovor ob integratsii s RF otrazit interesy Yuzhnoi Ossetii)
. Ria Novosti, 2014.
Google Scholar
RTF
EndNote XML
Jeraj, Milena
.
"
Bilateral and regional cooperation in disaster management – good practices/experiences of Slovenia
." In
22nd OSCE Economic and Environmental Forum “Responding to environmental challenges with a view to promoting cooperation and security in the OSCE area”
. Vienna, 2014.
Google Scholar
RTF
EndNote XML
Zou, Jianmin
.
Biologically Inspired Algorithms for Dynamic Topology Control in Mobile Networks
., 2014.
Google Scholar
RTF
EndNote XML
Cheng, Yu-Chin
.
Bis (Czech Counter-Intelligence Service) In Transformation 1994-2014
In
Research Paper No. ,
., 2014.
Google Scholar
RTF
EndNote XML
Zenn, Jacob
.
"
Boko Haram: Recruitment, Financing, and Arms Trafficking in the Lake Chad Region
."
CTC Sentinel
7, no. 10 (2014): 6.
Google Scholar
RTF
EndNote XML
Gill, Paul
,
John Horgan
, and
Paige Deckert
.
"
Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists
."
Journal of Forensic Sciences
59, no. 2 (2014): 425-35.
Google Scholar
RTF
EndNote XML
Reeves, Madeleine
.
Border Work: Spatial Lives of the State in Rural Central Asia
. Ithaca, NY: Cornell University Press, 2014.
Google Scholar
RTF
EndNote XML
Bosnia and Herzegovina Recovery Needs Assessment
., 2014.
Google Scholar
RTF
EndNote XML
Damon, Dan
.
Bosnia and WW1: The Living Legacy of Gavrilo Princip
. BBC, 2014.
Google Scholar
RTF
EndNote XML
‘Braća po SPC ordenju’: Vujanović, Rešetnjikov, Velja Ilić … [‘Brothers by SPC Ordination’: Vujanović, Reshetnikov, Velja Ilić …]
. Portal Analitika, 2014.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
236
237
238
239
240
241
242
243
244
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance