Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21387 results:
RTF
EndNote XML
2013
HM Government Emergency Response and Recovery. Non Statutory Guidance Accompanying the Civil Contingencies Act 2004
. London: Civil Contingencies Secretariat. , 2013.
Google Scholar
RTF
EndNote XML
Moghadam, Assaf
.
"
How Al Qaeda Innovates
."
Security Studies
22, no. 3 (2013): 466-97.
Google Scholar
RTF
EndNote XML
Hochwald, Thorsten
.
"
How Do Social Media Affect Intra-State Conflicts other than War?
"
Connections: The Quarterly Journal
12, no. 3 (2013): 9-37.
DOI
Google Scholar
RTF
EndNote XML
Abbas, Hassan
.
How Drones Create More Terrorists
. The Atlantic, 2013.
Google Scholar
RTF
EndNote XML
Plumer, Brad
.
"
How Long Before Fracking Spreads to Europe? A Decade, at Least
."
The Washington Post
(2013).
Google Scholar
RTF
EndNote XML
Greenwald, Glenn
.
"
How NSA can see ‘nearly everything you do online’
."
Guardian
(2013): 1-2.
Google Scholar
RTF
EndNote XML
Lukyanov, Fedor
.
How Russia Can Profit from Confrontation between the US and China
. Vol. 19 February 2013. Forbes, 2013.
Google Scholar
RTF
EndNote XML
Ratchev, Valeri
.
How to develop an effective, efficient and democratic defence institution - the lessons we are learning
., 2013.
Google Scholar
RTF
EndNote XML
Lefèvre, Eric
, and
Zied Elouedi
.
"
How to preserve the conflict as an alarm in the combination of belief functions?
"
Decision Support Systems
56 (2013): 326-333.
Google Scholar
RTF
EndNote XML
Gartenstein-Ross, Daveed
, and
Kelsey D. Atherton
.
"
How we killed privacy – in 4 easy steps
."
Foreign Policy
(2013).
Google Scholar
RTF
EndNote XML
Kleinig, John
, and
Nicholas G. Evans
.
"
Human Flourishing, Human Dignity, and Human Rights
."
Law and Philosophy
32 (2013): 539-564.
Google Scholar
RTF
EndNote XML
Gómez, Oscar A.
, and
Des Gasper
.
Human Security: A Thematic Guidance Note for Regional and National Human Development Report Teams
In
United Nations Development Programme
. Human Development Report Office, 2013.
Google Scholar
RTF
EndNote XML
Sheikh, Mayy El
, and
Alan Cowell
.
"
Hundreds Die as Egyptian Forces Attack Islamist Protesters
."
New York Times
(2013).
Google Scholar
RTF
EndNote XML
Azani, Eitan
.
"
The Hybrid Terrorist Organization: Hezbollah as a Case Study
."
Studies in Conflict & Terrorism
36, no. 11 (2013): 899-916.
Google Scholar
RTF
EndNote XML
McCulloh, Timothy
, and
Richard Johnson
.
Hybrid Warfare (JSOU Report)
. Florida: The JSOU Press, MacDill Air Force Base, 2013.
Google Scholar
RTF
EndNote XML
Tasevski, Predrag
.
I can hack your FB, can you catch me...
., 2013.
Google Scholar
RTF
EndNote XML
Im, Tobin
,
Greg Porumbescu
, and
Hyunkuk Lee
.
"
ICT as a buffer to change: A case study of the Seoul Metropolitan Government's Dasan Call Center
."
Public Performance & Management Review
36, no. 3 (2013): 436-455.
Google Scholar
RTF
EndNote XML
Mihalic, Tanja
, and
Dimitrios Buhalis
.
"
ICT as a New Competitive Advantage Factor - Case of Small Transitional Hotel Sector
."
Economic and Business Review for Central and South - Eastern Europe
15, no. 1 (2013): 33-56.
Google Scholar
RTF
EndNote XML
Stewart, Catrina
.
"
Illegal Ivory Trade Funds al-Shabaab’s Terrorist Attacks
."
The Independent
(2013).
Google Scholar
RTF
EndNote XML
Miklaucic, Michael
, and
Jacqueline Brewer
.
Illicit Networks and National Security in the Age of Globalization
. Center for Complex Operations (National Defense University Press), 2013.
Google Scholar
RTF
EndNote XML
Yunwen, Zhang
,
Yao Jingshun
, and
Dong Tianzhong
.
"
IMM model group selection and parameter setting (IMM 模型组的选择与参数的设定)
."
Journal of System Simulation
25, no. 004 (2013).
Google Scholar
RTF
EndNote XML
"
IMM 模型组的选择与参数的设定
."
系统仿真学报
25, no. 004 (2013).
Google Scholar
RTF
EndNote XML
Shehu, B.
.
"
Immigration Officers Who Help Boko Haram
."
Vanguard
1 (2013): 8-9.
Google Scholar
RTF
EndNote XML
D.Craig, Scotty
,
Xiangen Hu
,
Arthur C.Graesser
,
Anna E.Bargagliott
,
Allan Sterbinsky
,
Kyle R. Cheney
, and
Theresa Okwumabua
.
"
The impact of a technology-based mathematics after-school program using ALEKS on student's knowledge and behaviors
."
Computers & Education
68, no. 68 (2013): 495-504.
DOI
Google Scholar
RTF
EndNote XML
Huang, Yu
, and
Hualin Cheng
.
"
The impact of climate change on coastal geological disasters in southeastern China
."
Natural hazards
65 (2013): 377-390.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
294
295
296
297
298
299
300
301
302
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance