Jenkins, Brian Michael. "
Countering Al Qaeda." In
Defeating Terrorism: Shaping the New Security Environment. Guilford: CT: McGraw-Hill, 2004.
Jenkins, Brian Michael. "
Countering Al Qaeda." In
Defeating Terrorism: Shaping the New Security Environment. Guilford, CT: McGraw-Hill, 2004.
Lewis, Bernard. The Crisis of Islam . New York: Random House, 2004.
Ambainis, Andris, Markus Jakobsson, and Helger Lipmaa. Cryptographic Randomized Response Techniques In
Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Edited by
Feng Bao,
Robert H. Deng and
Jianying Zhou. Singapore: Computer Science 2947, 2004.
Cryptographic Randomized Response Techniques In
Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography. Singapore: Computer Science 2947, 2004.
Seifert, Jeffrey W.. Data Mining: An Overview. Washington, DC: Congressional Research Service, 2004.
Orfila, Agustin, Javier Carbo, and Arturo Ribagorda. "
Decision Model Analysis for Spam."
Information & Security: An International Journal 15, no. 2 (2004): 151-161.