Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2010
Strategija sodelovanja RS v mednarodnih operacijah in misijah
In
Uradni list RS
., 2010.
Google Scholar
RTF
EndNote XML
Government of the Republic of Macedonia
.
Strategy for e-government of the Republic of Macedonia
., 2010.
Google Scholar
RTF
EndNote XML
A Strong Britain in an Age of Uncertainty: The National Security Strategy
. UK Cabinet Office, 2010.
Google Scholar
RTF
EndNote XML
Stigak, A.А.
.
"
The structure of payment systems and modeling their performance based on system analysis
."
Electronic modeling 6
(2010): 97-109.
Google Scholar
RTF
EndNote XML
Di Mauro, Carmelo
,
Sara Bouchon
,
Christiaan Logtmeijer
,
Russell Pride
,
Thomas Hartung
, and
Jean-Pierre Nordvik
.
"
A Structured Approach to Identifying European Critical Infrastructures
."
International Journal of Critical Infrastructures
6, no. 3 (2010).
DOI
Google Scholar
RTF
EndNote XML
Yang, Zhou
.
Study on the vulnerability of road transport network based on Flow Interdiction Model
. Beijing: Beijing Normal University, 2010.
Google Scholar
RTF
EndNote XML
"
The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important
."
Economist
(2010).
Google Scholar
RTF
EndNote XML
Tsyganok, Vitaliy
, and
Sergii V. Kadenko
.
"
On sufficiency of the consistency level of group ordinal estimates
."
Journal of Automation and Information Sciences
42, no. 8 (2010): 42-47.
Google Scholar
RTF
EndNote XML
Salter, Mark B.
.
"
Surveillance
." In
The Routledge Handbook of New Security Studies
. London: Routledge, 2010.
Google Scholar
RTF
EndNote XML
Teixeira, Thiago
, and
Gershon Dublon
.
"
A Survey of Human-Sensing: Methods for Detecting Presence, Count, Location, Track, and Identity
."
ACM Computing Surveys 5
54, no. 1 (2010): 59.
Google Scholar
RTF
EndNote XML
SySSec Project Web Page
., 2010.
Google Scholar
RTF
EndNote XML
Spencer, Alexander
.
The tabloid terrorist: The predicative construction of new terrorism in the media
. New York: Palgrave Macmillan, 2010.
Google Scholar
RTF
EndNote XML
Durbin, Pat
, and
Terry Doerscher
.
Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value
. Austin, TX: Greenleaf Book Group Press, 2010.
Google Scholar
RTF
EndNote XML
Bazhanov, Yevgeny
.
"
Tangled Triangle of Russia, China and the U.S.
"
The Moscow Times
(2010).
Google Scholar
RTF
EndNote XML
Ivanova, Petya
.
Technical Evaluation Report
In
Analytical Support to Defence Transformation
. Paris: NATO RTA, 2010.
Google Scholar
RTF
EndNote XML
Serih, Andrey
.
Technical regulation in construction. Analytical review of world experience
. Chicago: SNIP, 2010.
Google Scholar
RTF
EndNote XML
Stocker, Mike
.
Technology Insertion and Management: Options for the Canadian Forces
In
Technical memorandum
., 2010.
Google Scholar
RTF
EndNote XML
Hryshchuk, Ruslan V.
.
Teoretychni osnovy modeljuvannja procesiv napadu na informaciju metodamy teorij dyferencialnyh igor ta dyferencialnyh peretvoren
. Zhytomyr: Ruta, 2010.
Google Scholar
RTF
EndNote XML
Servenay, David
.
Terroisme: pourquoi Alliance Base a fermé ȧ Paris
. Rue 89, L’Obs, 2010.
Google Scholar
RTF
EndNote XML
Yu, Lian
,
Wei-Tek Tsai
,
Liangjie Tang
,
Wei Zhao
,
Xiangji Chen
,
Linqing Liu
, and
Yan Zhao
.
Testing as a Service over Cloud
In
Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE)
. Nanjing, China, 2010.
Google Scholar
RTF
EndNote XML
Ahmad, Abu Umar Faruq
.
Theory and Practice of Modern Islamic Finance: The Case Analysis from Australia
. Universal-Publishers, 2010.
Google Scholar
RTF
EndNote XML
Jaspal, Zafar Nawaz
.
"
Threat of Extremism &Terrorist Syndicate beyond FATA
."
Journal of Political Studies
1, no. 2 (2010): 19-49.
Google Scholar
RTF
EndNote XML
Minchev, Zlatogor
.
Threats and Challenges in Social Networks. A European Glance and Alliance Perspective in the Context of the New Strategic Concept
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2010.
Google Scholar
RTF
EndNote XML
Time for a Human Approach
. Zurich: ISN, 2010.
Google Scholar
RTF
EndNote XML
TK_02_60 Project Web Page
., 2010.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
436
437
438
439
440
441
442
443
444
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance