Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2005
Polyakov, Leonid
.
"
An Analytical Overview of Democratic Oversight and Governance of the Defence and Security Sector in Ukraine
." In
DCAF Working Papers
., 2005.
Google Scholar
RTF
EndNote XML
Abadi, Martin
, and
Bruno Blanchet
.
"
Analyzing Security Protocols with Secrecy Types and Logic Programs
."
Journal of the ACM
52, no. 1 (2005): 102-146.
DOI
Google Scholar
RTF
EndNote XML
The ancient Corps of the Royal Carabinieri
., 2005.
Google Scholar
RTF
EndNote XML
Putin, Vladimir
.
Annual Address to the Federal Assembly of the Russian Federation
. Moscow: The Kremlin, 2005.
Google Scholar
RTF
EndNote XML
Dormann, Knut
.
"
Applicability of the Additional Protocols to Computer Network Attack
." In
International Experts Conference on Computer Network Attack and the Applicability of International Humanitarian Law
. Stockholm, 2005.
Google Scholar
RTF
EndNote XML
Laslau, Andi
.
"
Arabs in Romania, A Complete Radiography
."
Evenimentul Zilei
(2005).
Google Scholar
RTF
EndNote XML
Shalamanov, Velizar
, and
Stoyan Avramov
.
Architecture for the integration of field and stationary information systems for emergency management
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2005.
Google Scholar
RTF
EndNote XML
Kirov, Georgi
, and
Valentin Stoyanov
.
"
Architectures in the Analysis of Requirements and Design of Simulation Systems
."
Information & Security: An International Journal
16 (2005): 104-114.
DOI
Google Scholar
RTF
EndNote XML
Juthe, A.
.
"
Argument by Analogy
."
Argumentation
19, no. 1 (2005).
Google Scholar
RTF
EndNote XML
Armenia’s Commitments under Individual Partnership Action Plan with NATO, 2005
., 2005.
Google Scholar
RTF
EndNote XML
Armenia’s commitments under Individual Partnership Action Plan with NATO
., 2005.
Google Scholar
RTF
EndNote XML
Francis, David
.
"
Arms Expert Calls for START Verification Extension
."
Global Security Newswire
(2005).
Google Scholar
RTF
EndNote XML
Martin, Jeremy
.
The Art of Casual WiFi hacking
., 2005.
Google Scholar
RTF
EndNote XML
Peter, Szor
.
The Art of Computer Virus Research and Defense
. Addison Wesley Professional, 2005.
Google Scholar
RTF
EndNote XML
M. Rahmat, Imadudin
.
Arus Baru Islam Radikal; Transmisi Revivalisme Islam Timur Tengah ke Indonesia
. Jakarta: Erlangga, 2005.
Google Scholar
RTF
EndNote XML
Domin, Igor
, and
Aleksandr Savinkin
.
"
Asimmetrichnoe voevanie
."
Otechestvennye zapiski
5 (2005).
Google Scholar
RTF
EndNote XML
Tashkov, Dimitar
.
"
Assessing and Managing Risk in Operations Planning
."
Military Journal
(2005).
Google Scholar
RTF
EndNote XML
Affairs, Liese Prokop Aus
.
"
Austria–A Base of Re-organization for Terrorists
."
Curentul
(2005).
Google Scholar
RTF
EndNote XML
Armando, Alessandro
,
D.A. Basin
, and
Y. Boichut
.
"
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
." In
International Conference on Computer Aided Verification CAV 2005
. Heidelberg: Springer, 2005.
DOI
Google Scholar
RTF
EndNote XML
Starr, Frederick
, and
Svante E. Cornell
.
The Baku-Tbilisi-Ceyhan Pipeline: Oil Window to the West
. Washington DC: Central Asia-Caucasus Institute and Silk Road Studies Program, 2005.
Google Scholar
RTF
EndNote XML
Gallagher, Tom
.
The Balkans in the New Millennium: In the Shadow of War and Peace
. London: Routledge, 2005.
Google Scholar
RTF
EndNote XML
Mendelson, Sarah
.
Barracks and Brothels: Peacekeeping and Human Trafficking in the Balkans
. Washington, D.C.: CSIS, 2005.
Google Scholar
RTF
EndNote XML
Junqueira, Luis Carlos
, and
Jose Carneiro
.
Basic Histology Text & Atlas
. McGraw-Hill Professional, 2005.
Google Scholar
RTF
EndNote XML
R., Dhamijaр
, and
Tygar J.D.
.
The Battle Against Phishing: Dynamic Security Skins
. Symposium on Usable Privacy and Security (SOUPS), 2005.
Google Scholar
RTF
EndNote XML
Gadeyne, K.
,
T. Lefebvre
, and
H. Bruyninckx
.
"
Bayesian Hybrid Model-State Estimation Applied to Simultaneous Contact Formation Recognition and Geometrical Parameter Estimation
."
The International Journal of Robotics Research
(2005).
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
576
577
578
579
580
581
582
583
584
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance