Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2012
al-Filastini, Abu Qatada
.
al-Muqaraba li nazilat al-’asr
. Copenhagen: al-Nur, 2012.
Google Scholar
RTF
EndNote XML
Raghavan, Sudarsan
, and
Peter Finn
.
"
Al-Qaeda bombmaker Ibrahim Hassan al-Asiri has tried to attack the U.S. three times, officials say
."
Washington Post
(2012).
Google Scholar
RTF
EndNote XML
Gonçalves, Francisco
.
"
A Ameaça Jihadista nos Estabelecimentos Prisionais: Desafios e Dilemas
."
Nação e Defesa
132 (2012): 192-211 .
Google Scholar
RTF
EndNote XML
Panetta, Leon E.
.
America’s Pacific Rebalance
In
Project Syndicate
., 2012.
Google Scholar
RTF
EndNote XML
Zareapoor, Masoumeh
,
K.R. Seeja
, and
M.Afshar.Alam
.
"
Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria
."
International Journal of Computer Applications (0975 – 8887)
52, no. 3 (2012).
Google Scholar
RTF
EndNote XML
Tagarev, Todor
,
Venelin Georgiev
, and
Petya Ivanova
.
"
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
."
Information & Security: An International Journal
28, no. 1 (2012): 13-20.
DOI
Google Scholar
RTF
EndNote XML
Annexes to Chapter 1 of the Small Arms Survey 2011: States of Security
., 2012.
Google Scholar
RTF
EndNote XML
Annual Report of the ICC
., 2012.
Google Scholar
RTF
EndNote XML
Annual Report of the Ministry of Defence for 2011
. Ljubljana, 2012.
Google Scholar
RTF
EndNote XML
Annual Report of the Security Information Service for 2012
. Security Information Service, 2012.
Google Scholar
RTF
EndNote XML
Ministers, Council of
.
Annual Report on the Status of National Security of the Republic of Bulgaria in 2011
., 2012.
Google Scholar
RTF
EndNote XML
Kolegov, Ivaylo
.
Apple patent describes a great 3D camera
., 2012.
Google Scholar
RTF
EndNote XML
Anifowose, Fatai Adesina
, and
Safiriyu Ibiyemi Eludiora
.
"
Application of Artificial Intelligence in Network Intrusion Detection
."
World Applied Programming
2, no. 3 (2012): 158-166.
Google Scholar
RTF
EndNote XML
Subed, Jishnu
.
"
Application of Information Technology in Disaster and Emergency Management
."
International Journal of Cyber Warfare and Terrorism (IJCWT)
2, no. 4 (2012).
Google Scholar
RTF
EndNote XML
Brezhnev, Eugene
.
"
An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures
."
Information & Security: An International Journal
28, no. 2 (2012): 199-210.
DOI
Google Scholar
RTF
EndNote XML
Krasovska, Hanna
,
Olha Izmailova
, and
Kateryna Krasovska
.
"
Approach to Construct an Information Basis for Decision-Making System for a Comprehensive Assessment of Innovative Technogenic Safety Projects in Construction
."
Shliakhy pidvyshchennia efektyvnosti budivnytstva v umovakh formuvannia rynkovykh vidnosyn: Zb. naukovykh prats
28 (2012): 222-229.
Google Scholar
RTF
EndNote XML
Ma’oz, Moshe
.
"
The Arab Spring and the New Geo-Strategic Environment in the Middle East
."
Insight Turkey
14, no. 4 (2012).
Google Scholar
RTF
EndNote XML
Arab spring economies. Unfinished business
. Vol. 4 February 2012. The Economist, 2012.
Google Scholar
RTF
EndNote XML
Noi, Aylin Ünver
.
"
The Arab Spring, Its Effects on the Kurds, and the Approaches of Turkey, Iran, Syria, and Iraq on the Kurdish Issue
."
Middle East Review of International Affairs
16, no. 2 (2012).
Google Scholar
RTF
EndNote XML
Suponina, Elena
.
Arab Spring: The Season for Victory over the Islamists
. Vol. 25 December 2012. Forbes, 2012.
Google Scholar
RTF
EndNote XML
Swift, Christopher
.
"
Arc of Convergence: AQAP, Ansar al-Shari’a and the Struggle for Yemen
."
CTC Sentinel
5, no. 6 (2012): 1-6.
Google Scholar
RTF
EndNote XML
Ternier, Stefaan
,
Roland Klemke
,
Marco Kalz
,
Patricia van Ulzen
, and
Marcus Specht
.
"
ARLearn: Augmented Reality Meets Augmented Virtuality
."
Journal of Universal Computer Science
18 (2012): 2143-64.
Google Scholar
RTF
EndNote XML
Armed Forces Reserve Act of the Republic of Bulgaria
. State Gazette, no. 20, 2012.
Google Scholar
RTF
EndNote XML
Armenia’s Military Education Concept
., 2012.
Google Scholar
RTF
EndNote XML
Giragosian, Richard
.
Armenian Military & Security Policy: Regaining a Strategic Balance
. Regional Studies Center,, 2012.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
324
325
326
327
328
329
330
331
332
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance