Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2012
Suponina, Elena
.
Arab Spring: The Season for Victory over the Islamists
. Vol. 25 December 2012. Forbes, 2012.
Google Scholar
RTF
EndNote XML
Swift, Christopher
.
"
Arc of Convergence: AQAP, Ansar al-Shari’a and the Struggle for Yemen
."
CTC Sentinel
5, no. 6 (2012): 1-6.
Google Scholar
RTF
EndNote XML
Ternier, Stefaan
,
Roland Klemke
,
Marco Kalz
,
Patricia van Ulzen
, and
Marcus Specht
.
"
ARLearn: Augmented Reality Meets Augmented Virtuality
."
Journal of Universal Computer Science
18 (2012): 2143-64.
Google Scholar
RTF
EndNote XML
Armed Forces Reserve Act of the Republic of Bulgaria
. State Gazette, no. 20, 2012.
Google Scholar
RTF
EndNote XML
Armenia’s Military Education Concept
., 2012.
Google Scholar
RTF
EndNote XML
Giragosian, Richard
.
Armenian Military & Security Policy: Regaining a Strategic Balance
. Regional Studies Center,, 2012.
Google Scholar
RTF
EndNote XML
Lamborn, G. L.
.
Arms of Little Value: The Challenge of Insurgency and Global Instability in the Twenty-First Century
. Casemate, 2012.
Google Scholar
RTF
EndNote XML
Hiltz, Starr Roxanne
, and
Jose J. Gonzalez
.
"
Assessing and Improving the Trustworthiness of Social Media for Emergency Management: A Literature Review
." In
Norwegian Information Security Conference NISK 2012
. Bodø: University of Nordland, 2012.
Google Scholar
RTF
EndNote XML
Horak, Rudolf
.
"
Assessment of the Regions (Municipalities) Safeness
."
The Science for Population Protection
6, no. 1 (2012).
Google Scholar
RTF
EndNote XML
Kalinov, Kalin
.
"
The Asymmetric Nature of Terrorist Organisations and Its Impact on Maritime Security System Structure
." In
Piracy and Maritime Terrorism: Logistics, Strategies, Scenarios
. IOS Press, 2012.
Google Scholar
RTF
EndNote XML
Whitman, Tobie
, and
Jacqueline O’Neill
.
Attention to gender increases security in operations; Examples from the North Atlantic Treaty Organization (NATO)
. Washington, D.C.: The Institute for Inclusive Security, 2012.
Google Scholar
RTF
EndNote XML
Giegerich, Bastian
, and
Alexandra Jonas
.
"
Auf der Suche nach best practice? Die Entstehung nationaler Sicherheitsstrategien im internationalen Vergleich
."
Security and Peace
3, no. 30 (2012): 129-183.
Google Scholar
RTF
EndNote XML
On August 27–September 2, at least 50 Persons Fell Victim to Armed Conflict in Northern Caucasus
. Caucasian Knot, 2012.
Google Scholar
RTF
EndNote XML
Learn, ATW
.
Author Archives: kelleycatt
., 2012.
Google Scholar
RTF
EndNote XML
Chou, Gloria
.
"
Autonomy in Xinjiang: Institutional Dilemmas and the Rise of Uighur Ethno-Nationalism
."
The Josef Korbel Journal of Advanced International Studies
4 (2012): 170.
Google Scholar
RTF
EndNote XML
D'Mello, Sidney
, and
Art Graesser
.
"
AutoTutor and affective autotutor: Learning by talking with cognitively and emotionally intelligent computers that talk back
."
ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems
2, no. 4 (2012).
Google Scholar
RTF
EndNote XML
Weber, Keith
.
Azerbaijan and Turkmenistan Disputes and the Tragedy of the Commons
. Rep’s Blog, Center for Strategic and International Studies, 2012.
Google Scholar
RTF
EndNote XML
Azerbaijan Angered by Turkmenistan’s Work on Disputed Caspian Field
. Azernews, 2012.
Google Scholar
RTF
EndNote XML
Azerbaijan's Military Exercises in the Caspian: Who Is the Target?
. Eurasia Daily Monitor, Jamestown Foundation, 2012.
Google Scholar
RTF
EndNote XML
T., Əhmədov
.
"
Azərbaycan-NATO əlaqələri genişlənir
."
Respublika qəzeti,
046 (2012): 1.
Google Scholar
RTF
EndNote XML
Iliev, Mladen
.
A Balanced Scorecard for Managing the National Service for Protection
In
It4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2012.
DOI
Google Scholar
RTF
EndNote XML
Strjuk, Aleksey
,
Oleg Odarushchenko
, and
Valentina Odarushchenko
.
"
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service
."
Information & Security: An International Journal
28, no. 1 (2012): 133-145.
DOI
Google Scholar
RTF
EndNote XML
Rukavishnikov, Vladimir
.
"
The bear and the world: Projections of Russia’s policy after Putin’s return to Kremlin in 2012
."
Medjunarodni problemi
64, no. 1 (2012): 7-33.
DOI
Google Scholar
RTF
EndNote XML
Dheepa, V.
, and
R. Dhanapal
.
"
Behavior Based Credit Card Fraud Detection Using Support Vector Machines
."
ICTACT Journal on Soft Computing
2, no. 4 (2012).
Google Scholar
RTF
EndNote XML
Putin, Vladimir
.
"
Being Strong: National Security Guarantees for Russia
."
The Huffington Post
(2012).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
324
325
326
327
328
329
330
331
332
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance