Biblio

Export 21423 results:
2013
Joseph, Jonathan. "Resilience as embedded neoliberalism: a governmentality approach." Resilience 1, no. 1 (2013): 38-52.
Cavelty, Myriam Dunn, and Tim Prior. "Resilience in Security Policy: Present and Future." CSS Analysis in Security Policy 142 (2013): 142.
Linkov, Igor, Daniel Eisenberg, Kenton Plourde, Thomas P. Seager, Julia Allen, and Alexander Kott. "Resilience metrics for cyber systems." Environment Systems & Decisions 33, no. 4 (2013).
Ungar, Michael. "Resilience, Trauma, Context and Culture." Trauma, Violence, & Abuse 14, no. 3 (2013): 255-266.
Bodeau, Deborah, John Brtis, Richard Graubart, and Jonathan Salwen. Resiliency Techniques for System of Systems: Extending and Applying the Cyber Resiliency Engineering Framework to the Space Domain. Bedford, MA: MITRE, 2013.
Pospisil, Jan. "Resilienz: Die Neukonfiguration von Sicherheitspolitik im Zeitalter von Risiko." Austrian Journal of Political Science 1 (2013): 18-42.
Resolution by the Georgian Parliament., 2013.
van Reijn, Joop. "Resource management in an Intelligence and Security Service: a Dutch example." Information & Security: An International Journal 30, no. 1 (2013): 41-54.
Resources for ‘Training and Learning Architecture’ Webinar. ADL Web site, 2013.
Grant, Rachel Staley. Rethinking Nuclear Deterrence and Burden-Sharing. American Security Information Council (BASIC), 2013.
Roth, Kenneth. Rethinking Surveillance., 2013.
Dalrymple, William. Return of the King: The Battle for Afghanistan. London: Bloomsbury, 2013.
Kim, Cheonshik, YongSoo Choi, Hyoung-Joong Kim, Dongkyoo Shin, and Dongil; Shin. "Reversible Data Hiding for Halftone Images Using Histogram Modification." International Information Institute (Tokyo). Information; Koganei 16, no. 3 (2013): 1861-1872.
Liao, Hung-Jen, Chun-Hung Richard Lin, Ying -Chih, and Kuang-Yuan Tung. "Review: Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications (2013).
"Review of European Standards on ICT competences." Information Management (in Russian) 7 (2013): 30-35.
Briggs, Rachel, and Sebastien Feve. Review of Programs to Counter Narratives of Violent Extremism: What Works and What are the Implications for Government?. Institute for Strategic Dialogue, 2013.
Lackenbauer, Helené, and Richard Langlais. Review of the Practical Implementation of UNSCR 1325 for the Conduct of NATO-led Operations and Missions. Stockholm: Swedish Defence Research Agency FOI, 2013.
Lackenbauer, Helené, and Richard Langlais. Review of the Practical Implications of UNSCR 1325 for the Conduct of NATO-led Operations and Missions. Stockholm: Swedish Defense Research Agency (FOI), 2013.
RF Foreign Policy Concept In Approved by RF President V.V. Putin., 2013.
Bongo, Pathias P., Paul Chipangura, Mkhokheli Sithole, and Funa Moyo. "A rights-based analysis of disaster risk reduction framework in Zimbabwe and its implications for policy and practice." Journal of Disaster Risk Studies 5, no. 2 (2013): article 81.
Thompson, James. "The Rise of All." Connections: The Quarterly Journal 12, no. 3 (2013): 63-86.
Kahler, Miles. "Rising Powers and Global Governance: Negotiating Change in a Resilient Status Quo." International Affairs 89, no. 3 (2013): 711-29.
Beaula, Thangaraj, and J.Partheeban. "Risk Assessment of Natural Hazards in Nagapattinam District Using Fuzzy Logic Model." International Journal of Fuzzy Logic Systems (IJFLS) 3, no. 3 (2013).
"Riven doviry ukrayintsiv do vlady – odyn z najnyzhchykh u Yevropi." The Ukrainian Week (2013).
Riyadh asks GCC states to condemn Qatar’s actions in Egypt and Yemen. Vol. 25 November 2013. Middle East Monitor, 2013.

Pages