Adli, A., and Z. Nakao. Three steganography algorithms for midi files In
2005 International Conference on Machine Learning and Cybernetics. Vol. 4. Guangzhou, China, 2005.
Martorella, M.. "
Time Windowing for highly focused ISAR Image Reconstruction."
IEEE Trans. on Aerospace and Electronic System 41, no. 3 (2005): 992-1007.
Trafficking in Persons Report . U.S. Department of State, 2005.
Trafficking in Women from Romania into Germany–Comprehensive Report March 2005. Turin: United Nations Interregional Crime and Justice Research Institute, 2005.
Trafficking in Women from Romania into Germany—Comprehensive Report March 2005. Turin: United Nations Interregional Crime and Justice Research Institute, 2005.
Transcripts from the Milosevic Trial. Hague, Netherlands: International Criminal Tribunal for Yugoslavia (ICTY), 2005.
Treddenick, Jack. Transparency and Efficiency in Defence Planning and Spending In
PfP Consortium Security Sector Reform Conference. Garmisch-Partenkirchen, 2005.
Ye, E.Z., and S. Smith. "
Trusted Paths For Browsers."
ACM Transactions on Information and System Security 8, no. 2 (2005): 153-186.