Biblio

Export 21404 results:
2012
Hoyle, Craig. Flight International., 2012.
Nedkov, Stoyan, and Benjamin Burkhard. "Flood regulating ecosystem services—mapping supply and demand, in the Etropole municipality, Bulgaria." Ecological Indicators 21 (2012).
O’Brien, McKenzie. "Fluctuations Between Crime and Terror: The Case of Abu Sayyaf’s Kidnapping Activities." Terrorism and Political Violence 24, no. 2 (2012): 320-36.
Luft, Gal, and Anne Korin. "The Folly of Energy Independence." American Interest (2012).
Serfaty, Simon. "The Folly of Forgetting the West." Policy Review 174 (2012).
For Modification and Completion Criminal Code of the Republic of Moldova (Law 66) In Parliament of the Republic of Moldova., 2012.
Smith, Steve, Amelia Hadfield, and Tim Dunne. Foreign Policy: Theories, Actors, Cases. 2nd ed. Oxford: Oxford University Press, 2012.
Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles. FOCUS Deliverable 5.1, 2012.
Pereverzeva, Inna, Elena Troubitsyna, and Linas Laibinis. Formal Goal-Oriented Development of Resilient MAS in Event-B In Proceedings of 17th International Conference on Reliable Software Technologies. Berlin, Heidelberg: Springer-Verlag, 2012.
Tselkov, Veselin, and Nikolai Stoianov. A Formal Model of Cryptographic Systems for Protection of Information in Computer Systems and Networks In Bulgarian Cryptography Days – BulCrypt 2012. Sofia, Bulgaria, 2012.
Tarasyuk, Anton, Elena Troubitsyna, and Linas Laibinis. Formal Modelling and Verification of Service-Oriented Systems in Probabilistic Event-B In Proceedings of the International Conference on Integrated Formal Methods, IFM 2012., 2012.
Ritchey, Tom. "On the Formal Properties of Morphological Models." Acta Morphologica Generalis 1, no. 2 (2012): 21-35.
Lawford, Mark, and Alan Wassyng. "Formal Verification of Nuclear Systems: Past, Present, and Future." Information & Security: An International Journal 28, no. 2 (2012): 223-235.
Kharchenko, Vyacheslav, and Eugene Brezhnev. "Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants." Information & Security: An International Journal 28, no. 1 (2012): 65-78.
Savin, Leonid. "The formation of an Eurasian geopolitical context." Kazakhstan in global processes 2 (2012): 34-44, 39.
Coalson, Robert. Former U.S. State Dep’t Official Pifer Asks, ‘Are the Russians Ready to Reengage?’. Radio Free Europe/Radio Liberty, 2012.
Komanda, M.. "Foundations of Network Organizations Ontology." International Journal of Business and Management Studies 1, no. 1 (2012): 565-569.
Karokola, Geoffrey Rwezaura. A Framework for Securing e-Government Services: The Case of Tanzania In Computer and Systems Sciences. Vol. Doctor. Sweden: Stockholm University, 2012.
Ibraheem, Basem, Abeer Hamdy, and Nevien Darwish. "A Framework for Semantic Map Construction." International Journal of Computer Science Issues (IJCSI) 9, no. 5 (2012): 206-215.
Frankfurt airport gunman jailed for life. BBC News online, 2012.
Groome, Frank. "From Contradiction to Cooperation: A New Legal and Diplomatic Foundation for Energy Policy in the EU." Journal of Energy Security (2012).
Shiping, Tang. From Offensive Realism to Defensive Realism: A Social Evolutionary Interpretation of China’s Security Strategy. Nanyang Technical University, Singapore, 2012.
Eskola, Marko. "From Risk Society to Network Society: Preventing Cybercrimes in the 21st Century." Journal of Applied Security Research 7, no. 1 (2012).
Dempsey, Martin E.. "From the Chairman: Making Strategy Work." Joint Forces Quarterly 66 (2012): 2-3.
Efthymiopoulos, Marios P., and Valbona Zeneli. "From Transition to Opportunity: Security through Economic Development & Institutional Strengthening." Research in the World Economy 3, no. 2 (2012).

Pages