Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2013
Joseph, Jonathan
.
"
Resilience as embedded neoliberalism: a governmentality approach
."
Resilience
1, no. 1 (2013): 38-52.
Google Scholar
RTF
EndNote XML
Cavelty, Myriam Dunn
, and
Tim Prior
.
"
Resilience in Security Policy: Present and Future
."
CSS Analysis in Security Policy
142 (2013): 142.
Google Scholar
RTF
EndNote XML
Linkov, Igor
,
Daniel Eisenberg
,
Kenton Plourde
,
Thomas P. Seager
,
Julia Allen
, and
Alexander Kott
.
"
Resilience metrics for cyber systems
."
Environment Systems & Decisions
33, no. 4 (2013).
Google Scholar
RTF
EndNote XML
Ungar, Michael
.
"
Resilience, Trauma, Context and Culture
."
Trauma, Violence, & Abuse
14, no. 3 (2013): 255-266.
DOI
Google Scholar
RTF
EndNote XML
Bodeau, Deborah
,
John Brtis
,
Richard Graubart
, and
Jonathan Salwen
.
Resiliency Techniques for System of Systems: Extending and Applying the Cyber Resiliency Engineering Framework to the Space Domain
. Bedford, MA: MITRE, 2013.
Google Scholar
RTF
EndNote XML
Pospisil, Jan
.
"
Resilienz: Die Neukonfiguration von Sicherheitspolitik im Zeitalter von Risiko
."
Austrian Journal of Political Science
1 (2013): 18-42.
Google Scholar
RTF
EndNote XML
Resolution by the Georgian Parliament
., 2013.
Google Scholar
RTF
EndNote XML
van Reijn, Joop
.
"
Resource management in an Intelligence and Security Service: a Dutch example
."
Information & Security: An International Journal
30, no. 1 (2013): 41-54.
Google Scholar
RTF
EndNote XML
Resources for ‘Training and Learning Architecture’ Webinar
. ADL Web site, 2013.
Google Scholar
RTF
EndNote XML
Grant, Rachel Staley
.
Rethinking Nuclear Deterrence and Burden-Sharing
. American Security Information Council (BASIC), 2013.
Google Scholar
RTF
EndNote XML
Roth, Kenneth
.
Rethinking Surveillance
., 2013.
Google Scholar
RTF
EndNote XML
Dalrymple, William
.
Return of the King: The Battle for Afghanistan
. London: Bloomsbury, 2013.
Google Scholar
RTF
EndNote XML
Kim, Cheonshik
,
YongSoo Choi
,
Hyoung-Joong Kim
,
Dongkyoo Shin
, and
Dongil; Shin
.
"
Reversible Data Hiding for Halftone Images Using Histogram Modification
."
International Information Institute (Tokyo). Information; Koganei
16, no. 3 (2013): 1861-1872.
Google Scholar
RTF
EndNote XML
Liao, Hung-Jen
,
Chun-Hung Richard Lin
,
Ying -Chih
, and
Kuang-Yuan Tung
.
"
Review: Intrusion detection system: A comprehensive review
."
Journal of Network and Computer Applications
(2013).
DOI
Google Scholar
RTF
EndNote XML
"
Review of European Standards on ICT competences
."
Information Management (in Russian)
7 (2013): 30-35.
Google Scholar
RTF
EndNote XML
Briggs, Rachel
, and
Sebastien Feve
.
Review of Programs to Counter Narratives of Violent Extremism: What Works and What are the Implications for Government?
. Institute for Strategic Dialogue, 2013.
Google Scholar
RTF
EndNote XML
Lackenbauer, Helené
, and
Richard Langlais
.
Review of the Practical Implementation of UNSCR 1325 for the Conduct of NATO-led Operations and Missions
. Stockholm: Swedish Defence Research Agency FOI, 2013.
Google Scholar
RTF
EndNote XML
Lackenbauer, Helené
, and
Richard Langlais
.
Review of the Practical Implications of UNSCR 1325 for the Conduct of NATO-led Operations and Missions
. Stockholm: Swedish Defense Research Agency (FOI), 2013.
Google Scholar
RTF
EndNote XML
RF Foreign Policy Concept
In
Approved by RF President V.V. Putin
., 2013.
Google Scholar
RTF
EndNote XML
Bongo, Pathias P.
,
Paul Chipangura
,
Mkhokheli Sithole
, and
Funa Moyo
.
"
A rights-based analysis of disaster risk reduction framework in Zimbabwe and its implications for policy and practice
."
Journal of Disaster Risk Studies
5, no. 2 (2013): article 81.
Google Scholar
RTF
EndNote XML
Thompson, James
.
"
The Rise of All
."
Connections: The Quarterly Journal
12, no. 3 (2013): 63-86.
DOI
Google Scholar
RTF
EndNote XML
Kahler, Miles
.
"
Rising Powers and Global Governance: Negotiating Change in a Resilient Status Quo
."
International Affairs
89, no. 3 (2013): 711-29.
Google Scholar
RTF
EndNote XML
Beaula, Thangaraj
, and
J.Partheeban
.
"
Risk Assessment of Natural Hazards in Nagapattinam District Using Fuzzy Logic Model
."
International Journal of Fuzzy Logic Systems (IJFLS)
3, no. 3 (2013).
Google Scholar
RTF
EndNote XML
"
Riven doviry ukrayintsiv do vlady – odyn z najnyzhchykh u Yevropi
."
The Ukrainian Week
(2013).
Google Scholar
RTF
EndNote XML
Riyadh asks GCC states to condemn Qatar’s actions in Egypt and Yemen
. Vol. 25 November 2013. Middle East Monitor, 2013.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
309
310
311
312
313
314
315
316
317
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance