Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21406 results:
RTF
EndNote XML
2012
Jiao, Wu
.
"
China Welcomes US Role in Asia-Pacific Region
."
China Daily
(2012).
Google Scholar
RTF
EndNote XML
Malhotra, A.
.
Chinese Inroads into Central Asia: Focus on Oil and Gas
. Journal of Energy Security, 2012.
Google Scholar
RTF
EndNote XML
Illiashenko, Oleg
, and
Eugene Babeshko
.
"
Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems
."
Information & Security: An International Journal
28, no. 2 (2012): 275-285.
DOI
Google Scholar
RTF
EndNote XML
CIA World Factbook - Armenia
., 2012.
Google Scholar
RTF
EndNote XML
Kilcullen, David
.
"
The City as a System: Future Conflict and Urban Resilience
."
The Fletcher Forum of World Affairs
36, no. 2 (2012): 19-39.
Google Scholar
RTF
EndNote XML
Procházková, Dana
.
"
Civil protection
." In
International Conference on “Global Existential Risks” (Globálne existenciálne riziká)
. Žilina, 2012.
Google Scholar
RTF
EndNote XML
Civil Protection Cooperation for the Candidate Countries and Potential Candidates
In
Analytical Study on Host Nation Support
., 2012.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
Civilian Control in Defence (in Russian)
., 2012.
Google Scholar
RTF
EndNote XML
Appelrouth, Scott A.
, and
Laura Desfor Edles
.
Classical and Contemporary Theory
. 2nd Edition ed. Thousand Oaks, CA: Pine Forge Press, 2012.
Google Scholar
RTF
EndNote XML
Grishin, Vladimir
.
Classical Control Theory and Methods of Artificial Intelligence. Curse of Dimensionality
., 2012.
Google Scholar
RTF
EndNote XML
Brzoska, Michael
.
"
Climate change and the military in China, Russia, the United Kingdom, and the United States
."
Bulletin of the Atomic Scientists
62, no. 2 (2012): 43-54, p. 48.
Google Scholar
RTF
EndNote XML
Clover, Charles
.
"
Clinton Vows Thwart New Soviet Union
."
Financial times
(2012).
Google Scholar
RTF
EndNote XML
Vilkomir, Sergiy
.
"
Cloud Testing: A State-of-the-Art Review
."
Information & Security: An International Journal
28, no. 2 (2012): 213-222.
DOI
Google Scholar
RTF
EndNote XML
Capodieci, A.
,
A.L. Guido
,
L. Mainetti
, and
U. Barchetti
.
"
Collaborative Process Management for the Networked Enterprise: A Case Study
." In
26th IEEE International Conference on Advanced Information Networking and Applications Workshops
. WAINA, 2012.
DOI
Google Scholar
RTF
EndNote XML
Williamson, Wade
.
Combating Emerging Threats Through Security Collaboration
. Security Week, 2012.
Google Scholar
RTF
EndNote XML
Silk, Dan
.
Community Policing to Prevent Violent Extremism
In
FBI Law Enforcement Bulletin
., 2012.
Google Scholar
RTF
EndNote XML
Hartley, Keith
.
"
Company Survey Series: I: BAE Systems Plc
."
Defence and Peace Economics
23:4 (2012).
DOI
Google Scholar
RTF
EndNote XML
Djebbar, Fatiha
,
Beghdad Ayad
,
Karim Abed Meraim
, and
Habib Hamam
.
"
Comparative study of digital audio steganography techniques
."
EURASIP Journal on Audio, Speech, and Music Processing
1 (2012): 25.
Google Scholar
RTF
EndNote XML
Son, Joon
,
Chinedum Irrechukwu
, and
Patrick Fitzgibbons
.
"
A Comparison of Virtual Lab Solutions for Online Cyber Security Education
."
Communiactions of the IIMA
2, no. 4 (2012).
Google Scholar
RTF
EndNote XML
Weng, Lilian
,
Alessandro Flammini
,
Alessandro Vespignani
, and
Filippo Menczer
.
"
Competition among Memes in a World with Limited Attention
."
Nature Scientific Reports
2, no. Article number: 335 (2012).
Google Scholar
RTF
EndNote XML
Schadlow, Nadia
.
"
Competitive Engagement: Upgrading America’s Influence
."
Small Wars Journal
(2012).
Google Scholar
RTF
EndNote XML
Prati, R.
, and
G. Batista
.
"
A complexity-invariant measure based on fractal dimension for time series classification
."
IJNCR
3, no. 3 (2012): 59-73.
Google Scholar
RTF
EndNote XML
Hemamali, Tennakoon
.
A Comprehensive Methodology for Profiling Cyber-criminals
. Asia Pacific Institute of Information Technology, 2012.
Google Scholar
RTF
EndNote XML
McCarthy, N.K.
.
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
. McGraw-Hill Osborne Media, 2012.
Google Scholar
RTF
EndNote XML
Rocha, L.
.
Computer Security Incident Handling – 6 Steps. Count Upon Security
., 2012.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
327
328
329
330
331
332
333
334
335
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance