Biblio

Export 21404 results:
2011
Daly, John C. K.. Are ISAF’s Tenuous Supply Lines Sustainable?. ISN, 2011.
Lioe, Kim Eduard. Armed Forces in Law Enforcement Operations? - The German and European Perspective. Springer Science & Business Media, 2011.
Lioe, Kim Eduard. Armed Forces in Law Enforcement Operations? The German and European Perspective. Heidelberg: Springer, 2011.
Danielyan, Emil. "Armenia Plans More NATO-Backed Defense Reforms." Eurasia Daily Monitor 8, no. 153 (2011).
Harutyunyan, Sarkis. "Armenian Military ‘Interested’ in Russian Rocket Systems." RFE/RL–Armenia (2011).
Armenian Parliament has ratified important amendments to the CSTO Regulations and Treaty (in Russian). Regnum information agency, 2011.
Whitman, J.. "The Arms Control Challenges of Nanotechnology." Contemporary Security Policy 32, no. 1 (2011): 99-115.
Tyugu, Enn. Artificial Intelligence in Cyber Defense In Proceedings of the Third International Conference on Cyber Conflict, ed. C. Czosseck, E. Tyugu, T. Wingfield. Tallinn: CCD COE, 2011.
Meleagrou-Hitchens, Alexander. As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad. London: International Centre for the Study of Radicalization, 2011.
Simpson, Charles. "Assessing the Arab Spring in Libya and Syria. A Compilation of Varying Statements from Key Actors." Connections: The Quarterly Journal 11, no. 1 (2011): 55-67.
Zlateva, Plamena, Lyubka Pashova, Krasimir Stoyanov, and Dimiter Velev. "Assessment from Natural Hazards Using Fuzzy Logic." International Journal of Social Science and Humanity 1 , no. 3 (2011).
Assessment Report of the Parliamentary Committee of Inquiry: Elbe Philharmonic Hall, Citizens of the Free and Hanseatic City of Hamburg., 2011.
Sharip, Farkhad. "Astana Hosts Islamic Economic Conference Downplaying Political Dimensions." Eurasia Daily Monitor 8, no. 117 (2011).
Sultanov, Asker. "Atambayev Reviews 2011 Achievements." Central Asia Online (2011).
Manadhata, Pratyusa K., and Jeannette M. Wing. "An Attack Surface Metric." IEEE Transactions on Software Engineering 37, no. 3 (2011): 371-386.
Siddhartha, Choubey, G.R. Sinha, Patel Bagwati Charan, Choubey Abha, and Thakur Kavita. "Avoidance of Confusion between Similar looking Characters in Neuro-fuzzy based License Plate Recognition." International Journal of Machine Learning and Computing 1, no. 4 (2011).
"Azerbaijan Deplores Reported Armenian Arms Acquisition from Moldova." RFE/RL News (2011).
Georgiev, Venelin, and Todor Tagarev. Balancing Ambitions and Resource Constraints in Shaping Collective Security and Defence Policies In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Wong, Edward. "Beijing Warns U.S. About South China Sea Disputes." New York Times (2011).
Steder, Frank. Benchmarking Studies and Capability Costing. Paris: RTA, 2011.
Epstein, Zach. "Berg: Smartphone shipments grew 74% in 2010." Boy Genius Report (2011).
Barno, David W., Andrew Exum, and Matthew Irvine. Beyond Afghanistan: A Regional Security Strategy for South and Central Asia., 2011.
Lawson, Sean. Beyond cyber-doom: Cyberattack Scenarios and the Evidence of History In Working Paper. Mercatus Center, George Mason University, 2011.
Lawson, Sean. "Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History." Working Paper 11, no. 01 (2011).
Zając, J.. "Bezpieczeństwo – aspekty terminologiczne." In Współczesny wymiar bezpieczeństwa. Między teorią a praktyką, 18. Warsaw: RWO, 2011.

Pages